CN116305196A - RFID communication method and system - Google Patents

RFID communication method and system Download PDF

Info

Publication number
CN116305196A
CN116305196A CN202310123787.XA CN202310123787A CN116305196A CN 116305196 A CN116305196 A CN 116305196A CN 202310123787 A CN202310123787 A CN 202310123787A CN 116305196 A CN116305196 A CN 116305196A
Authority
CN
China
Prior art keywords
tag
key
reader
information
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310123787.XA
Other languages
Chinese (zh)
Inventor
敖海
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Core Microelectronics Technology Zhuhai Co ltd
Original Assignee
Core Microelectronics Technology Zhuhai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Core Microelectronics Technology Zhuhai Co ltd filed Critical Core Microelectronics Technology Zhuhai Co ltd
Priority to CN202310123787.XA priority Critical patent/CN116305196A/en
Publication of CN116305196A publication Critical patent/CN116305196A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses an RFID communication method and system. The reader sends a query command to the tag, the tag starts an internal PUF circuit, extracts a key, encrypts a verification code set by a system and sends the verification code back to the reader; the reader queries a pre-registered tag key library, and performs decryption attempt on the encrypted check code until the check code is successfully decrypted, so as to obtain a key. The reader sends a subsequent command to the tag, the transmitted information is encrypted with the queried key, the tag decrypts the received information using the extracted key, and the information sent back to the reader is encrypted using the key. And the reader decrypts the received tag information by using the inquired key, the communication is finished, the tag closes the internal PUF circuit, and the key is deleted. The communication information between the reader and the tag is encrypted by using the key, and the method for extracting the key by adopting the PUF circuit improves the system security.

Description

RFID communication method and system
Technical Field
The invention belongs to the technical field of RFID (Radio Frequency Identification ), and particularly relates to an RFID communication method and system combining PUF (Physical Unclonable Functions, physical unclonable function) technology.
Background
RFID is a radio frequency identification technology that results from combining integrated circuits with wireless communication technology. On the working frequency, the RFID is divided into a plurality of frequency bands of 125KHz to 134KHz, 13.56MHz in high frequency, 860MHz to 960MHz in ultrahigh frequency, 2.45G of microwave and 5.8G. In the working mode, the RFID can be mainly divided into a passive RFID and an active RFID.
PUF technology is a circuit technology that generates unpredictable, uncloneable, and tamper-proof keys by extracting random differences that inevitably occur during the fabrication of integrated circuits. Unlike traditional security solutions, PUF technology can dynamically generate an infinite number of unique keys without storing keys for encryption, and thus has a great application prospect in the field of security and anti-counterfeiting.
Conventional RFID technology stores a tag ID or a key in a nonvolatile memory inside the tag, and communication between the reader and the tag is not encrypted. For application occasions such as identity recognition, security authentication and the like, key information is easily cracked and labels are forged by information interception, information copying and other methods, so that the security of the system is jeopardized.
Disclosure of Invention
In response to the above-identified deficiencies or improvements in the art, the present invention provides a method and system for RFID communication that incorporates PUF technology. The tag can extract unpredictable, duplicated and tampered encryption keys through the integrated PUF circuit and does not need to be stored. The communication information between the reader and the tag is encrypted by using the key, and even if the information is leaked, the information cannot be cracked to obtain real information, so that the safety of the RFID system can be obviously improved.
To achieve the above object, according to one aspect of the present invention, there is provided an RFID communication method comprising the steps of:
the reader sends a query command to the tag to activate the tag;
after receiving the inquiry command, the tag starts up the internal PUF circuit, extracts the key generated by the PUF circuit, encrypts the check code by the proposed key, and sends the encrypted check code back to the reader;
the reader receives the encrypted check code, inquires the tag-key library to obtain a key corresponding to the tag, and decrypts the encrypted check code by using the inquired key until the check code is successfully decrypted;
the reader successfully establishes a communication link with the tag.
In some embodiments, the RFID communication method further comprises: the tag-keystore is pre-registered such that the tag-keystore contains tag information and key information generated by PUF circuits within the tag.
In some embodiments, after the reader successfully establishes a communication link with the tag, the RFID communication method further comprises:
the reader encrypts the information to be sent subsequently by using the inquired secret key and sends the information to the tag;
after receiving the encrypted follow-up information sent by the reader, the tag decrypts the received information by using the extracted key to obtain the information sent by the reader and responds to the information to generate response information, and then encrypts the generated response information by using the extracted key and sends the response information back to the reader;
after receiving the encrypted response information sent by the tag, the reader decrypts the received encrypted response information by using the inquired secret key to obtain the response information of the tag;
and the communication between the reader and the tag is finished, the tag closes the PUF circuit in the tag, and the extracted key is deleted.
In some embodiments, the reader uses the same encryption algorithm as the tags, the PUF circuit generates the same key each time inside each tag, and the key extracted each time by the tag is the same as the key corresponding to the tag in the pre-registered tag-keystore of the reader.
In some embodiments, the RFID communication system determines the length of the key based on the total number of tags, the key extracted by each tag in the RFID communication system being different.
In some embodiments, the pre-registration tag-keystore specifically comprises:
in a safe environment, all tags in the RFID communication system sequentially extract keys generated by PUF circuits in the tags, and the extracted keys are sent to a reader;
the reader sequentially receives the keys sent by the labels and records the keys corresponding to the labels in a label-key library;
after registration is completed, each tag deletes the extracted key.
In some embodiments, the check code is preset and recorded inside the reader and the tag.
In some embodiments, if the tag does not use the key encryption check code in the pre-registered tag-key library of the reader, the reader cannot query a valid tag key from the tag key library, and cannot decrypt the check code, and at this time, the tag is determined to be invalid, and further communication is terminated.
According to another aspect of the present invention, there is provided an RFID communication system including a reader and a tag; the reader comprises a first encryption and decryption module, a key inquiry module and a tag-key library, and the tag comprises a second encryption and decryption module, a key extraction module and a PUF circuit; the PUF circuit is used for generating a secret key after the tag receives an inquiry command sent by the reader; the key extraction module is used for extracting a key generated by the PUF circuit; the second encryption and decryption module is used for encrypting the preset check code of the RFID system by using the key extracted by the key extraction module and sending the encrypted check code back to the reader; the tag-key library is used for storing information of a pre-registered tag and key information generated by the PUF circuit; the key inquiry module is used for inquiring a pre-registered tag-key library after receiving the encrypted check code sent by the tag to obtain a key corresponding to the tag; the first encryption and decryption module is used for decrypting the encrypted check code sent by the tag by using the key inquired by the key inquiry module; and the reader successfully establishes communication connection with the tag after the first encryption and decryption module successfully decrypts the check code.
In some embodiments, the first encryption and decryption module is further configured to encrypt information to be sent by the reader after the reader and the tag are successfully connected through communication, and send the information to the tag after the information to be sent by the reader is encrypted by the key queried by the key query module.
In some embodiments, the second encryption and decryption module is further configured to decrypt the received information with the key extracted by the key extraction module after receiving the encrypted subsequent information sent by the reader after the reader and the tag successfully establish communication connection, obtain the information sent by the reader and respond to the information, generate response information, encrypt the generated response information with the key extracted by the key extraction module, and send the response information back to the reader.
In some embodiments, the first encryption and decryption module is further configured to decrypt the received encrypted response information with the key queried by the key query module after receiving the encrypted response information sent by the tag after the reader successfully establishes communication connection with the tag, so as to obtain the response information of the tag.
In some embodiments, the check code is preset and recorded inside the reader and the tag; the reader and the tags adopt the same encryption algorithm, the key generated by the PUF circuit each time is the same in each tag, and the key extracted by each tag each time is the same as the key corresponding to the tag in the tag-key library.
In general, the above technical solutions conceived by the present invention have the following beneficial effects compared with the prior art: the method for extracting the key by using the integrated PUF circuit replaces the method for storing the key by using the nonvolatile memory, the PUF circuit is started when the integrated PUF circuit is used, the key is extracted, the PUF circuit is closed when the integrated PUF circuit is not used, and the key is deleted. Therefore, the tag does not need to store the key, and the key extracted by the PUF circuit has unpredictable, copying and tampering characteristics, so that the security problem of the key is solved. Furthermore, the reader and the tag both use the secret key extracted by the PUF circuit, and encrypt the communication information by adopting the same encryption algorithm, and only the real secret key is obtained to decrypt the real information, thereby solving the problem of communication safety.
Drawings
FIG. 1 is a flow chart of an RFID communication method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of the structure of an RFID communication system according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. In addition, the technical features of the embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
As shown in fig. 1, the RFID communication method according to the embodiment of the present invention includes the following steps:
(1) The reader starts to communicate with the tag: the reader sends a radio frequency carrier signal and a query command to the tag to activate the tag.
(2) After receiving the radio frequency carrier signal and the inquiry command, the tag responds to the reader: the tag starts up its internal PUF circuit, extracts the key generated by the PUF circuit, encrypts the check code preset by the RFID communication system with the extracted key, and sends the encrypted check code back to the reader.
In some embodiments, the RFID communication system determines the length of the key based on the total number of tags. In some embodiments, the PUF circuit inside the tag has a sufficient number of bits to generate a key with a sufficient length, and each tag can extract a key with a sufficient length to ensure that the extracted key is different for each tag in the RFID communication system, thereby meeting the application requirements of the RFID communication system.
In some embodiments, the predetermined verification code is recorded inside the reader and the tag.
(3) The reader receives the encrypted check code, inquires a pre-registered tag-key library to obtain a key corresponding to the tag, and decrypts the encrypted check code by using the inquired key until the check code is successfully decrypted. The reader successfully establishes a communication link with the tag.
In some embodiments, during the pre-enrollment phase, all tags within the RFID communication system and the keys generated by PUF circuits within each tag are enrolled in a secure environment and all tag-key information is stored in the reader's tag-key library.
In some embodiments, the pre-registering the tag-keystore specifically comprises the steps of:
(A) In a secure environment, all tags in an RFID communication system sequentially extract keys generated by PUF circuits within the tags, and the extracted keys are sent to a reader.
(B) The reader sequentially receives the keys sent by the tags and records the keys corresponding to the tags in a tag-key library.
(C) After registration is completed, each tag deletes the extracted key.
In some embodiments, the PUF circuit ensures that the key generated each time is the same, by error correction or other methods, inside each tag, without change, thereby making the key extracted each time by the tag the same as the key corresponding to the tag in the pre-registered tag-keystore of the reader.
In some embodiments, if the tag does not use the key encryption check code in the pre-registered tag-key library of the reader, the reader cannot query a valid tag key from the tag key library, and cannot decrypt the check code, and at this time, the tag is determined to be invalid, and further communication is terminated.
(4) After communication connection is established with the tag, the reader encrypts the information to be sent subsequently by using the inquired secret key and sends the information to the tag.
In some embodiments, when the reader sends all subsequent information to the tag, the information to be sent is encrypted by the queried key and then sent to the tag.
In some embodiments, the reader employs the same encryption algorithm as the tag, which encrypts and decrypts the information using the same key. In some embodiments, the information encrypted with a key to the tag is decrypted by the reader only using the same key. In some embodiments, the information encrypted with a key to the reader, the tag can decrypt the information only using the same key.
(5) After receiving the encrypted follow-up information sent by the reader, the tag decrypts the received information by using the extracted key to obtain the information sent by the reader and responds to the information to generate response information, and then encrypts the generated response information by using the extracted key and sends the response information back to the reader.
(6) After receiving the encrypted response information sent by the tag, the reader decrypts the received encrypted response information by using the queried key to obtain the response information of the tag.
(7) And the communication between the reader and the tag is finished, the tag closes the PUF circuit in the tag, and the extracted key is deleted.
As shown in fig. 2, an RFID communication system according to an embodiment of the present invention, which corresponds to the foregoing RFID communication method, includes a reader and a tag. The reader comprises a first encryption and decryption module, a key inquiry module and a tag-key library, and the tag comprises a second encryption and decryption module, a key extraction module and a PUF circuit.
The PUF circuit is used for generating a key after the tag receives a radio frequency carrier signal and a query command sent by the reader. The key extraction module is used for extracting a key generated by the PUF circuit. The second encryption and decryption module is used for encrypting the preset check code of the RFID system by using the key extracted by the key extraction module and sending the encrypted check code back to the reader.
The tag-key library is used to store pre-registered tag-key information obtained by registering, in a secure environment, keys generated by PUF circuits within all tags and within each tag within the RFID communication system. And the key inquiry module is used for inquiring a pre-registered tag-key library after receiving the encrypted check code sent by the tag to obtain a key corresponding to the tag. The first encryption and decryption module is used for performing decryption attempt on the encrypted check code sent by the tag by using the key inquired by the key inquiry module until the check code is successfully decrypted.
The first encryption and decryption module is also used for encrypting the information to be sent by the reader subsequently by using the key inquired by the key inquiry module after the communication connection between the reader and the tag is successfully established, and then sending the information to the tag.
The second encryption and decryption module of the tag is further used for decrypting the received information by using the key extracted by the key extraction module after receiving the encrypted follow-up information sent by the reader after the communication connection between the reader and the tag is successfully established, obtaining the information sent by the reader and responding, generating response information, encrypting the generated response information by using the key extracted by the key extraction module, and sending the response information back to the reader.
The first encryption and decryption module of the reader is further used for decrypting the received encrypted response information by using the key inquired by the key inquiry module after the encrypted response information sent by the tag is received after the reader and the tag are successfully connected in a communication mode, so that the response information of the tag is obtained.
The invention replaces the method of storing the key in the nonvolatile memory by the method of extracting the key by the integrated PUF circuit, starts the PUF circuit when in use, extracts the key, closes the PUF circuit when not in use, and deletes the key. Therefore, the tag does not need to store the key, and the key extracted by the PUF circuit has unpredictable, copying and tampering characteristics, so that the security problem of the key is solved. Furthermore, the reader and the tag both use the secret key extracted by the PUF circuit, and encrypt the communication information by adopting the same encryption algorithm, and only the real secret key is obtained to decrypt the real information, thereby solving the problem of communication safety.
It will be readily appreciated by those skilled in the art that the foregoing description is merely a preferred embodiment of the invention and is not intended to limit the invention, but any modifications, equivalents, improvements or alternatives falling within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (10)

1. An RFID communication method, comprising the steps of:
pre-registering a tag-key library such that the tag-key library contains tag information and key information generated by PUF circuits within the tag;
the reader sends a query command to the tag to activate the tag;
after receiving the inquiry command, the tag starts up the internal PUF circuit, extracts the key generated by the PUF circuit, encrypts the check code by using the extracted key, and sends the encrypted check code back to the reader;
the reader receives the encrypted check code, inquires the tag-key library to obtain a key corresponding to the tag, and decrypts the encrypted check code by using the inquired key until the check code is successfully decrypted;
the reader successfully establishes a communication link with the tag.
2. The RFID communication method of claim 1, wherein after the reader successfully establishes a communication link with a tag, the method further comprises:
the reader encrypts the information to be sent subsequently by using the inquired secret key and sends the information to the tag;
after receiving the encrypted follow-up information sent by the reader, the tag decrypts the received information by using the extracted key to obtain the information sent by the reader and responds to the information to generate response information, and then encrypts the generated response information by using the extracted key and sends the response information back to the reader;
after receiving the encrypted response information sent by the tag, the reader decrypts the received encrypted response information by using the inquired secret key to obtain the response information of the tag;
and the communication between the reader and the tag is finished, the tag closes the PUF circuit in the tag, and the extracted key is deleted.
3. The RFID communication method of claim 2, wherein the reader uses the same encryption algorithm as the tags, the PUF circuit generates the same key each time inside each tag, and the key extracted each time by the tag is the same as the key corresponding to the tag in the tag-keystore.
4. A method of RFID communication as claimed in any one of claims 1 to 3, wherein the length of the key is determined based on the total number of tags, the key extracted by each tag being different;
the pre-registered tag-keystore comprises:
in a safe environment, each tag sequentially extracts a key generated by a PUF circuit in the tag, and the extracted key is sent to a reader;
the reader sequentially receives the keys sent by the labels and records the keys corresponding to the labels in a label-key library;
after registration is completed, each tag deletes the extracted key.
5. A method according to any one of claims 1 to 3, wherein the check code is preset and recorded inside the reader and the tag.
6. The RFID communication method of claim 1, wherein when the tag does not encrypt the check code using the key in the tag-key library, the reader cannot query the tag-key library for a valid key corresponding to the tag, and cannot decrypt the check code, and the tag is determined to be invalid, and further communication is terminated.
7. An RFID communication system comprising a reader and a tag; the reader comprises a first encryption and decryption module, a key inquiry module and a tag-key library, wherein the tag comprises a second encryption and decryption module, a key extraction module and a PUF circuit;
the PUF circuit is used for generating a secret key after the tag receives the inquiry command sent by the reader; the key extraction module is used for extracting a key generated by the PUF circuit; the second encryption and decryption module is used for encrypting the check code by using the key extracted by the key extraction module and sending the encrypted check code back to the reader;
the tag-key library is used for storing pre-registered information of the tag and key information generated by the PUF circuit; the key inquiry module is used for inquiring the pre-registered tag-key library after receiving the encrypted check code sent by the tag to obtain a key corresponding to the tag; the first encryption and decryption module is used for decrypting the encrypted check code sent by the tag by using the key inquired by the key inquiry module;
and the reader successfully establishes communication connection with the tag after the first encryption and decryption module successfully decrypts the check code.
8. The RFID communication system of claim 7, wherein the first encryption/decryption module is further configured to encrypt information to be transmitted subsequently by the reader with the key queried by the key query module and transmit the encrypted information to the tag after the communication connection between the reader and the tag is successfully established;
the second encryption and decryption module is further configured to decrypt the received information by using the key extracted by the key extraction module after receiving the encrypted subsequent information sent by the reader after the communication connection between the reader and the tag is successfully established, obtain the information sent by the reader and respond to the information, generate response information, encrypt the generated response information by using the key extracted by the key extraction module, and send the response information back to the reader.
9. The RFID communication system of claim 8, wherein the first encryption/decryption module is further configured to decrypt the received encrypted response information with the key queried by the key query module after receiving the encrypted response information sent by the tag after the reader successfully establishes a communication connection with the tag, to obtain the response information of the tag.
10. The RFID communication system according to any one of claims 7 to 9, wherein the check code is preset and recorded inside the reader and the tag; the reader and the tags adopt the same encryption algorithm, the key generated by the PUF circuit each time is the same inside each tag, and the key extracted by each time by each tag is the same as the key corresponding to the tag in the tag-key library.
CN202310123787.XA 2019-12-28 2019-12-28 RFID communication method and system Pending CN116305196A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310123787.XA CN116305196A (en) 2019-12-28 2019-12-28 RFID communication method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911382753.2A CN111046413B (en) 2019-12-28 2019-12-28 RFID communication method and system
CN202310123787.XA CN116305196A (en) 2019-12-28 2019-12-28 RFID communication method and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201911382753.2A Division CN111046413B (en) 2019-12-28 2019-12-28 RFID communication method and system

Publications (1)

Publication Number Publication Date
CN116305196A true CN116305196A (en) 2023-06-23

Family

ID=70240672

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310123787.XA Pending CN116305196A (en) 2019-12-28 2019-12-28 RFID communication method and system
CN201911382753.2A Active CN111046413B (en) 2019-12-28 2019-12-28 RFID communication method and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201911382753.2A Active CN111046413B (en) 2019-12-28 2019-12-28 RFID communication method and system

Country Status (1)

Country Link
CN (2) CN116305196A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150180A (en) * 2022-07-14 2022-10-04 江苏芯盛智能科技有限公司 Storage device management method, storage device, management device, and storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001072107A2 (en) * 2000-03-24 2001-10-04 International Paper Rfid tag for authentication and identification
US7492258B1 (en) * 2006-03-21 2009-02-17 Radiofy Llc Systems and methods for RFID security
WO2011018414A2 (en) * 2009-08-14 2011-02-17 Intrinsic Id B.V. Physically unclonable function with tamper prevention and anti-aging system
CN103295048A (en) * 2013-05-20 2013-09-11 爱康普科技(大连)有限公司 System and method for transmitting electronic tag information
CN103345690B (en) * 2013-07-19 2019-12-24 中山大学 Anti-counterfeiting method based on RFID and physical unclonable function
JP5867635B2 (en) * 2014-03-13 2016-02-24 株式会社アクアビットスパイラルズ Tag management system, tag management method, information providing system, information providing method, and devices used therefor
CN106385320B (en) * 2016-11-01 2023-04-07 南京邮电大学 RFID anti-counterfeiting device and anti-counterfeiting method based on PUF and digital signature
CN106845304B (en) * 2017-01-22 2019-03-19 国网江苏省电力公司电力科学研究院 A kind of method and system for realizing reader and smart-tag authentication in RFID system
CN107017997A (en) * 2017-06-01 2017-08-04 国网江苏省电力公司电力科学研究院 A kind of auth method, reader and label
CN108573182A (en) * 2018-04-26 2018-09-25 深圳市盛路物联通讯技术有限公司 A kind of radio frequency signal communication method and system
CN108921995A (en) * 2018-07-03 2018-11-30 河海大学常州校区 RFID card chip intelligent door lock based on the unclonable technology of physics

Also Published As

Publication number Publication date
CN111046413B (en) 2023-09-12
CN111046413A (en) 2020-04-21

Similar Documents

Publication Publication Date Title
EP3118776B1 (en) Security authentication method for hiding ultra high frequency electronic tag identifier
US8947211B2 (en) Communication data protection method based on symmetric key encryption in RFID system, and apparatus for enabling the method
CN101847199B (en) Security authentication method for radio frequency recognition system
CN104184733B (en) A kind of RFID lightweight mutual authentication methods encoded based on CRC
US20140093144A1 (en) More-Secure Hardware Token
CN101271534A (en) RFID label and reading device thereof, reading system and safety authentication method
CN106845304A (en) A kind of method and system for realizing reader and smart-tag authentication in rfid system
CN103281189A (en) Light weight class safe protocol certification system and method for radio frequency identification equipment
CN104883681A (en) Mobile RFID mutual authentication method based on dynamic shared secret key
KR101284155B1 (en) authentication process using of one time password
CN106789024A (en) A kind of remote de-locking method, device and system
CN104579688B (en) It is a kind of based on Hash function can synchronized update key RFID mutual authentication method
CN101136073A (en) Electronic label safety identification method
WO2006003562A1 (en) Method of choosing one of a multitude of data sets being registered with a device and corresponding device
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
CN106936571A (en) Synthesize computing using word to realize the method that single label key is wirelessly generated
CN111046413B (en) RFID communication method and system
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
KR100605138B1 (en) Authorization method in radio frequency identification system
CN111448815A (en) Secure RFID tag identification
CN104462926A (en) Intelligent card identity recognition method and system
KR100680272B1 (en) Rfid authentication system and its method
CN110492992A (en) A kind of data encryption and transmission method based on radio RF recognition technology
KR20090072840A (en) Security system of tag data with rfid middleware and method for processing the same
KR100951527B1 (en) Encrypting method for id of rfid tag, authenticating method of rfid tag and rfid authenticating system using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination