CN116599673A - Anti-counterfeiting verification method of NFC electronic tag and corresponding NFC electronic tag - Google Patents

Anti-counterfeiting verification method of NFC electronic tag and corresponding NFC electronic tag Download PDF

Info

Publication number
CN116599673A
CN116599673A CN202310457906.5A CN202310457906A CN116599673A CN 116599673 A CN116599673 A CN 116599673A CN 202310457906 A CN202310457906 A CN 202310457906A CN 116599673 A CN116599673 A CN 116599673A
Authority
CN
China
Prior art keywords
nfc
verification
nfc tag
tag
response value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310457906.5A
Other languages
Chinese (zh)
Inventor
闫淑辉
邓晓辉
刘玮
张瑞兵
陈忠东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Industrial Park Xinchuang Electronic Technology Co ltd
Beijing Puanxin Technology Co ltd
Original Assignee
Suzhou Industrial Park Xinchuang Electronic Technology Co ltd
Beijing Puanxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Industrial Park Xinchuang Electronic Technology Co ltd, Beijing Puanxin Technology Co ltd filed Critical Suzhou Industrial Park Xinchuang Electronic Technology Co ltd
Priority to CN202310457906.5A priority Critical patent/CN116599673A/en
Publication of CN116599673A publication Critical patent/CN116599673A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • H04B5/77
    • H04B5/79
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the application provides an anti-counterfeiting verification method of an NFC electronic tag and a corresponding NFC electronic tag, and relates to the field of security and anti-counterfeiting, wherein the method comprises the following steps: the NFC tag supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC tag; the target equipment receives a wireless signal started by the NFC tag, and a verification starting end generates a challenge signal by the verification end and sends the challenge signal to the NFC tag; a PUF circuit in the NFC tag receives the challenge signal, and a physical unclonable function of the PUF circuit generates a response value according to the challenge signal; the verification terminal compares the response value with the response value registered corresponding to the NFC tag identification identity; and when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is verified, and otherwise, the NFC tag is not verified. The method and the device have the advantages that the identity uniqueness of the NFC label is guaranteed, the safety of the NFC label is guaranteed, and the safety of the environment where the target device is applied is guaranteed.

Description

Anti-counterfeiting verification method of NFC electronic tag and corresponding NFC electronic tag
Technical Field
The application relates to the field of security and anti-counterfeiting, in particular to an NFC electronic tag anti-counterfeiting verification method and a corresponding NFC electronic tag.
Background
Near field communication (Near Field Communication, NFC for short) is a fast short-range high-frequency wireless communication technology that operates at a frequency of 13.56MHz (megahertz), has a communication connection setup time of less than 1 second, and is typically limited to a communication distance within 10 cm. An NFC communication initiating device (e.g., an NFC tag) generates a wireless signal and powers a target communication device through an electromagnetic field, which modulates the existing electromagnetic field back to the communication initiating device. Because the passive NFC tag only needs the antenna and the corresponding logic device without additional batteries, the passive NFC tag is simple to manufacture and low in cost, and is widely applied to electronic signature cards, anti-fake identification, novel fingerprint cards, novel visual cards, passive NFC intelligent locks, passive electronic ink tags and the like at present, and great convenience is brought to life of people. When NFC is used as an identity identifier, an NFC UID comparison mode is adopted, namely, through application of APP, communication initiating equipment reads the UID of an NFC tag, the read UID of the NFC tag is transmitted to a background database, whether the UID of the NFC tag is authorized is compared to judge authenticity, but the mode cannot prevent a blank card from writing in the UID by itself, namely, a blank NFC chip is purchased, and then what UID is written when what UID is written is required to be written, so that the NFC tag can be cloned easily. In the application field with high anti-counterfeiting requirement, in order to avoid cloning NFC labels, NFC labels with security algorithms are appeared, the labels are not only compared with UIDs, but also encrypted by the security algorithms, the encrypted NFC labels are obtained by fixedly writing keys in NFC, one chip corresponds to one fixed key, and the anti-counterfeiting capacity of the labels is improved by a mathematical encryption method.
In carrying out the present application, the applicant has found that at least the following problems exist in the prior art:
the unencrypted NFC tag, UID can be easily read and written and then copied; after the secret key of the encrypted NFC tag is revealed or the detected channel is attacked, the NFC tag can be copied and cloned, so that the uniqueness of the NFC tag identity cannot be guaranteed.
Disclosure of Invention
The embodiment of the application provides an anti-counterfeiting verification method of an NFC electronic tag and a corresponding NFC electronic tag, which can solve the technical problem that the NFC tag is copied and cloned in the prior art.
To achieve the above object, in a first aspect, an embodiment of the present application provides an anti-counterfeit verification method for an NFC electronic tag, including:
the NFC tag supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC tag;
after receiving the wireless signal started by the NFC tag, the target device starts a verification terminal, generates a challenge signal by the verification terminal and sends the challenge signal to the NFC tag;
a Physical Unclonable Function (PUF) circuit in the NFC tag receives the challenge signal, and the physical unclonable function of the PUF circuit generates a corresponding response value according to the challenge signal;
the verification terminal compares the response value with a registration response value corresponding to the NFC tag identification identity; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification end, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
In a second aspect, an embodiment of the present application provides an anti-counterfeit verification method of an NFC electronic tag, applied to an NFC electronic tag terminal, including:
the NFC tag supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC tag;
a Physical Unclonable Function (PUF) circuit in the NFC tag receives the challenge signal, and the physical unclonable function of the PUF circuit generates a corresponding response value according to the challenge signal; the challenge signal is that after receiving the wireless signal started by the NFC tag, the target device starts a verification terminal and the verification terminal generates the challenge signal;
the NFC tag sends the response value to the verification terminal; comparing the response value with a registration response value corresponding to the NFC tag identification through the verification terminal; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification end, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
In a third aspect, an embodiment of the present application provides an anti-counterfeit verification method of an NFC electronic tag, applied to a target device end, including:
the target device starts a verification terminal after receiving the wireless signal started by the NFC tag, generates a challenge signal by the verification terminal and sends the challenge signal to the NFC tag;
the verification terminal receives the response value sent by the NFC tag; wherein the response value is a response value generated from the challenge signal by a physical unclonable function, PUF, circuit within the NFC tag;
the verification terminal compares the response value with a registration response value corresponding to the NFC tag identification identity; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification end, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
In a fourth aspect, an embodiment of the present application provides an NFC electronic tag, which is characterized by including:
the NFC antenna is connected to the NFC circuit through an impedance matching transmission line; the NFC antenna is used for receiving and transmitting communication signals, and the communication signals comprise challenge signals from a verification end and response values generated by the challenge signals forwarded by the NFC circuit;
the NFC circuit is connected to the PUF circuit through a bus interface; the NFC circuit is a circuit with near field communication power supply energy collection, communication signal receiving and transmitting and communication protocol processing functions; the communication signal transceiver comprises the challenge signal forwarded by the NFC antenna, and forwards a response value generated according to the challenge signal to the NFC antenna;
the PUF circuit is connected with the NFC circuit through a bus interface, receives the challenge signal forwarded by the NFC antenna, and returns to the physical unclonable function of the PUF circuit to generate a corresponding response value according to the challenge signal.
The technical scheme has the following beneficial effects: because the physical unclonable function of the NFC electronic tag with the unique identity registered at the target equipment verification end is unique, the NFC tag supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC tag; after receiving the wireless signal started by the NFC tag, the target device starts a verification terminal to generate a challenge signal by the verification terminal and sends the challenge signal to the NFC tag; the response signal is also unique when a challenge signal is initiated to the PUF circuit. When the UID of the non-encrypted NFC tag is read and written and then copied and then started through the target equipment, the response signal of the anti-counterfeiting method is the registration response value of the NFC tag with different real identities when the anti-counterfeiting method receives the challenge signal, so that the non-encrypted NFC tag can be judged to be a card class which is not identified, such as a counterfeit card, and the real NFC tag is ensured not to be stolen. Similarly, when the secret key of the encrypted NFC tag is leaked or the detected channel is attacked, the NFC tag can be copied and cloned, and when the target device is started up by the anti-counterfeiting method, the response signal is the registration response value of the NFC electronic tag with different real identity identifiers, the imitated cloned NFC tag is judged to be a card class which is not identified such as a fake card, the identity uniqueness of the NFC tag is guaranteed, the safety of the NFC tag is guaranteed, and the safety of the environment applied by the target device is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an anti-counterfeit verification method of an NFC electronic tag according to an embodiment of the present application;
fig. 2 is a flowchart of an anti-counterfeit verification method of an NFC electronic tag (applied to an NFC electronic tag end) according to an embodiment of the present application;
fig. 3 is a flowchart of an anti-counterfeit verification method (applied to a target device) of an NFC electronic tag according to an embodiment of the present application;
fig. 4 is a schematic logic structure diagram of an NFC electronic tag according to an embodiment of the present application;
fig. 5 is a logic control diagram of an anti-counterfeit verification method of an NFC electronic tag according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
As shown in fig. 1, in combination with the embodiment of the present application, an anti-counterfeit verification method of an NFC electronic tag is provided, including:
s101: the NFC tag supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC tag;
s102: after receiving the wireless signal started by the NFC tag, the target device starts a verification terminal to generate a challenge signal by the verification terminal and sends the challenge signal to the NFC tag;
s103: the Physical Unclonable Function (PUF) circuit in the NFC tag receives the challenge signal, the physical unclonable function of the PUF circuit generates a corresponding response value according to the challenge signal, and the NFC tag sends the response value corresponding to the challenge signal to the verification terminal;
s104: the verification terminal compares the response value with a registration response value corresponding to the NFC tag identification identity; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification end, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
Since the physical unclonable function (PUF, physically unclonable function) refers to a random physical factor that is unpredictable and uncontrollable during the device manufacturing process, resulting in a micro-physical structure that has small differences, a challenge-response relationship is created between different device units on the input and output signals that is independent of each other, and since it is not possible to clone devices with the same challenge-response, this relationship is called a physical unclonable function. Each PUF chip has the following characteristics: (1) uniqueness: each chip is randomly distributed and unique; (2) anticounterfeiting properties: the chip itself is extracted from the uncertainty in the chip manufacturing process, and the same PUF value cannot be duplicated again; (3) unpredictability: there is no way to predict the chip before it is manufactured; (4) tamper-evident: the PUF value of the chip cannot be positioned and modified, extraction is convenient, extraction is performed in a circuit structure every time the chip is started, and the chip has uniqueness and cannot be tampered.
Therefore, for the NFC electronic tag with the unique identity registered at the target equipment verification end, the physical unclonable function is unique, when a challenge signal is initiated to the PUF circuit, the response signal is also unique, and the challenge-response relationship of the PUF circuit is a physical one-way function relationship, so that the physical one-way function relationship is difficult to mathematically model and predict, and is difficult to crack. Therefore, when the non-encrypted NFC tag is started through the target equipment after the UID is copied after being read and written easily, and when the challenge signal is received, the corresponding response signal is different from the registration response value of the NFC tag with the real identity, so that the cloned NFC tag can be judged to be a card class which is not identified, such as a fake card, and the real NFC tag is ensured not to be stolen. Similarly, after the secret key of the encrypted NFC tag is revealed or the detected channel is attacked, the NFC tag is copied and cloned, but when the NFC tag is started by the target device, a challenge signal is received, the response signal is different from the registration response value of the NFC electronic tag of the real identity, and then the cloned NFC tag is judged to be a card type which is not identified such as a fake card, so that the identity uniqueness of the NFC tag can be ensured, the safety of the NFC tag is ensured, and the safety of the application environment of the target device is ensured.
Preferably, the anti-counterfeiting verification method of the NFC electronic tag further comprises the following steps:
s105: after the target device starts the verification terminal, the verification terminal acquires a user identity from the NFC tag and verifies the user identity of the NFC tag;
s106: if the user identity of the NFC tag fails to pass the verification of the verification end, indicating that the NFC tag fails to pass the verification, and ending the verification; the verification terminal does not initiate a challenge signal to the NFC tag;
s107: and if the user identity of the NFC tag passes the verification of the verification terminal, further generating a challenge signal by the verification terminal.
When the user identity of the NFC tag fails to pass the verification at the verification end of the target device, the NFC tag is indicated to be not a true NFC tag matched with the target device and is not allowed to be used. After the user identity of the NFC tag passes the verification at the verification end of the target device, whether the NFC tag is a real tag or not needs to be further verified through a physical unclonable function, if so, the NFC tag is allowed to be used, otherwise, the NFC tag is forbidden, and the safety of the NFC tag and the safety of the environment where the target device is applied can be ensured. The NFC tag is protected by the identification number code (unique user identification) of the NFC tag, and a layer of firm protection measures are added.
Preferably, the anti-counterfeiting verification method of the NFC electronic tag further comprises the following steps:
s108: extracting unique physical unclonable functions of each NFC label from the chip of each NFC label aiming at each NFC label for the target equipment, and storing the unique physical unclonable functions in the verification terminal, namely a label registration process; the physical unclonable function refers to a physical structure with small differences formed by uncertain factors in the manufacturing process of the chip, wherein the physical structure enables the chip to have registration response values which are unique and different from other chips respectively when facing the same challenge signal. Since the physical unclonable function (PUF, physically unclonable function) refers to a random physical factor that is unpredictable and uncontrollable during the device manufacturing process, resulting in a micro-physical structure that has small differences, a challenge-response relationship is created between different device units on the input and output signals that is independent of each other, and since it is not possible to clone devices with the same challenge-response, this relationship is called a physical unclonable function. Each PUF chip has the following characteristics: (1) uniqueness: each chip is randomly distributed and unique; (2) anticounterfeiting properties: the chip itself is extracted from the uncertainty in the chip manufacturing process, and the same PUF value cannot be duplicated again; (3) unpredictability: there is no way to predict the chip before it is manufactured; (4) tamper-evident: the PUF value of the chip cannot be positioned and modified, extraction is convenient, extraction can be performed in a circuit structure after each chip is started, and the chip has uniqueness and cannot be tampered.
Before the NFC tag is applied, a tag registration is required, and the challenge and response relationship of the unique physical unclonable function in the chip of the NFC tag are extracted for verifying whether the NFC tag is a real NFC tag or not when the NFC tag is used, not a counterfeit NFC tag. Therefore, in the application, the NFC label can increase the physical anti-counterfeiting capacity on the basis of mathematical anti-counterfeiting safety, and greatly improves the anti-counterfeiting, tamper-proofing and copy-proofing capacity of the NFC label.
Preferably, the anti-counterfeiting verification method of the NFC electronic tag further comprises the following steps:
s109: and the NFC antenna arranged on the NFC tag receives the challenge signal and transmits the challenge signal to the Physical Unclonable Function (PUF) circuit in the NFC tag through a bus interface. The NFC antenna transmits and receives and forwards the communication signal, so as to transmit and receive the challenge signal and the response signal (response value) of the challenge signal.
Preferably, the verification method for the anti-counterfeiting of the NFC electronic tag further comprises the following steps:
s110: the physical unclonable function of the PUF circuit generates a corresponding response signal according to the challenge signal, the response signal is returned to the NFC circuit through a bus, and the NFC circuit carries out mathematical operation on the response signal to output a response value. And carrying out mathematical operation on the response signals to output response values for verification of a verification terminal.
As shown in fig. 2, in combination with an embodiment of the present application, an anti-counterfeit verification method of an NFC electronic tag is provided, which is applied to an NFC electronic tag terminal, and includes:
s201: the NFC tag supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC tag;
s202: a Physical Unclonable Function (PUF) circuit in the NFC tag receives the challenge signal, and the physical unclonable function of the PUF circuit generates a corresponding response value according to the challenge signal; the challenge signal is that after receiving the wireless signal started by the NFC tag, the target device starts a verification terminal and the verification terminal generates the challenge signal;
s203: the NFC tag sends the response value to the verification terminal; comparing the response value with a registration response value corresponding to the NFC tag identification identity through the verification terminal; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification end, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
Preferably, the anti-counterfeiting verification method of the NFC electronic tag further comprises the following steps:
s204: after the target device starts the verification terminal, the user identity of the NFC tag is returned to the verification terminal;
s205: and after the user identity of the NFC tag passes the verification of the verification end, receiving a challenge signal initiated by the verification end to the NFC tag.
Preferably, the anti-counterfeiting verification method of the NFC electronic tag further comprises the following steps:
s206: and the NFC antenna arranged on the NFC tag receives the challenge signal and transmits the challenge signal to the Physical Unclonable Function (PUF) circuit in the NFC tag through a bus interface.
Preferably, the anti-counterfeiting verification method of the NFC electronic tag further comprises the following steps:
s207: the physical unclonable function of the PUF circuit generates a corresponding response signal according to the challenge signal, the response signal is returned to the NFC circuit through a bus, and the NFC circuit carries out mathematical operation on the response signal to output a response value.
As shown in fig. 3, in combination with an embodiment of the present application, an anti-counterfeit verification method of an NFC electronic tag is provided, applied to a target device side, and includes:
s301: the target device starts a verification terminal after receiving the wireless signal started by the NFC tag, generates a challenge signal by the verification terminal and sends the challenge signal to the NFC tag;
s302: the verification terminal receives the response value sent by the NFC tag; wherein the response value is a response value generated from the challenge signal by a physical unclonable function, PUF, circuit within the NFC tag;
s303: the verification terminal compares the response value with a registration response value corresponding to the NFC tag identification identity; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification end, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
Preferably, the anti-counterfeiting verification method of the NFC electronic tag further comprises the following steps:
s304: after the target device starts the verification terminal, the verification terminal acquires a user identity from the NFC tag and verifies the user identity of the NFC tag;
s305: if the user identity of the NFC tag fails to pass the verification of the verification end, indicating that the NFC tag fails to pass the verification, and ending the verification; the verification terminal does not initiate a challenge signal to the NFC tag;
s306: and if the user identity of the NFC tag passes the verification of the verification terminal, the verification terminal generates a challenge signal.
Preferably, the anti-counterfeiting verification method of the NFC electronic tag further comprises the following steps:
s307: extracting unique physical unclonable functions of each NFC label from the chip of each NFC label for each target device, and storing the unique physical unclonable functions in the verification terminal; the physical unclonable function refers to a physical structure with small differences formed by uncertain factors in the manufacturing process of the chip, wherein the physical structure enables the chip to have registration response values which are unique and different from other chips respectively when facing the same challenge signal.
As shown in fig. 4, in combination with an embodiment of the present application, there is provided an NFC electronic tag, including:
the NFC antenna is connected to the NFC circuit through an impedance matching transmission line; the NFC antenna is used for receiving and transmitting communication signals, and the communication signals comprise challenge signals from a verification end and response values generated by the challenge signals forwarded by the NFC circuit; and when the NFC electronic tag is determined to be used for target equipment, the unique physical unclonable function of each NFC electronic tag is extracted from the chip of the NFC tag and is stored in the verification terminal. The NFC label supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC label, and after receiving the wireless signal started by the NFC label, the target equipment starts a verification terminal to generate a challenge signal by the verification terminal and sends the challenge signal to the NFC label so as to verify the NFC label.
The NFC circuit is connected to the PUF circuit through a bus interface; the NFC circuit is a circuit with near field communication power supply energy collection, communication signal receiving and transmitting and communication protocol processing functions; the communication signal transceiver comprises the challenge signal forwarded by the NFC antenna, and forwards a response value generated according to the challenge signal to the NFC antenna;
the PUF circuit is connected with the NFC circuit through a bus interface, receives the challenge signal forwarded by the NFC antenna, and returns to the physical unclonable function of the PUF circuit to generate a corresponding response value according to the challenge signal.
Preferably, the NFC electronic tag further includes:
the EEPROM storage circuit is connected with the NFC circuit through a bus interface; the EEPROM stores wireless communication protocol data of near field communication and user-defined data of a user of the NFC electronic tag;
the NFC circuit comprises an RF unit and a power supply unit;
the RF unit comprises a radio frequency power supply for near field wireless communication and an interface for communication signals.
The NFC electronic tag of the embodiment of the application comprises: NFC antenna, NFC circuit (or NFC function circuit), PUF circuit, EEPROM storage circuit, wherein EEPROM stores near field wireless communication protocol data as well as user-defined data.
The NFC antenna circuit is connected with the RF unit and the power supply unit of the NFC functional circuit through the impedance matching transmission line, and the NFC functional circuit is connected with the PUF and the EEPROM circuit through the bus interface; the NFC circuit is a circuit for completing the functions of power supply energy collection, communication signal receiving and transmitting and communication protocol processing of near field communication; the RF unit performs the functions of a radio frequency power supply and a signal interface of near field wireless communication.
The NFC circuit initiates a PUF challenge to the PUF circuit through the bus interface by using a challenge signal received by the NFC antenna, the PUF circuit returns a response signal through the bus, the NFC circuit carries out mathematical operation on the response signal, and the response signal (namely a response value) subjected to the mathematical operation is sent through the NFC antenna. NFC near field communication constitutes by card reader and label, and the PUF challenge is that upper APP sends the label through the card reader, and the NFC circuit of label is with the challenge signal (challenge value) of receiving through the bus input to PUF circuit, and PUF circuit returns the response value that the challenge signal corresponds. After receiving the response value returned by the PUF circuit, the NFC circuit performs protocol and RF signal processing, and then sends the processed signal (i.e., the response value) to the NFC reader through the NFC antenna, and the NFC device sends the signal to the upper verification terminal APP which initiates the challenge.
Wherein the challenge signal is a binary digit sequence, changing the input binary digit sequence changes the challenge, and by changing the challenge signal input to the PUF, the PUF output response signal (response value) changes accordingly. Then pass verification<User identity identification: UID, challenge signal: c (C) UID_i Response signal R UID_i >The correctness of the arithmetic results of the mathematical algorithms of the three parameters can realize the authentication of the identity authenticity of the NFC tag.
As shown in fig. 5, assuming that a chip with a PUF function is used for counterfeiting, a counterfeit cloned NFC tag card is obtained, which can be registered at the verification end APP of the target device, for example, the registered UID card number=1 and coincides with the actual NFC tag card number=1. However:
the real NFC tag card with UID card number=1, its challenge-corresponding pair information is: uid=1, cuid1_i, ruid1_i;
whereas the cloned NFC tag card with UID card number=1, its challenge-corresponding pair information is: cuid1_i=cuid1' _i; RUID1_i is not equal to RUID1' _i;
the result of the verification is: f (uid=1, cuid1'_i, RUID1' _i) noteqf (uid=1, cuid1_i, RUID 1_i), i.e.: the response signals of the counterfeit cloned NFC tag and the real NFC tag cannot be identical for the same challenge signal, and can therefore be identified.
It should be understood that the specific order or hierarchy of steps in the processes disclosed are examples of exemplary approaches. Based on design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged without departing from the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
In the foregoing detailed description, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments of the subject matter require more features than are expressly recited in each claim. Rather, as the following claims reflect, application lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate preferred embodiment of this application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. As will be apparent to those skilled in the art; various modifications to these embodiments will be readily apparent, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the embodiments described herein are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, as used in the specification or claims, the term "comprising" is intended to be inclusive in a manner similar to the term "comprising," as interpreted when employed as a transitional word in a claim. Furthermore, any use of the term "or" in the specification of the claims is intended to mean "non-exclusive or".
Those of skill in the art will further appreciate that the various illustrative logical blocks (illustrative logical block), units, and steps described in connection with the embodiments of the application may be implemented by electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components (illustrative components), elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Those skilled in the art may implement the described functionality in varying ways for each particular application, but such implementation is not to be understood as beyond the scope of the embodiments of the present application.
The various illustrative logical blocks or units described in the embodiments of the application may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described. A general purpose processor may be a microprocessor, but in the alternative, the general purpose processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. In an example, a storage medium may be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may reside in a user terminal. In the alternative, the processor and the storage medium may reside as distinct components in a user terminal.
In one or more exemplary designs, the above-described functions of embodiments of the present application may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on a computer-readable medium or transmitted as one or more instructions or code on the computer-readable medium. Computer readable media includes both computer storage media and communication media that facilitate transfer of computer programs from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media may include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to carry or store program code in the form of instructions or data structures and other data structures that may be read by a general or special purpose computer, or a general or special purpose processor. Further, any connection is properly termed a computer-readable medium, e.g., if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, digital Subscriber Line (DSL), or wireless such as infrared, radio, and microwave, and is also included in the definition of computer-readable medium. The disks (disks) and disks (disks) include compact disks, laser disks, optical disks, DVDs, floppy disks, and blu-ray discs where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included within the computer-readable media.
The foregoing description of the embodiments has been provided for the purpose of illustrating the general principles of the application, and is not meant to limit the scope of the application, but to limit the application to the particular embodiments, and any modifications, equivalents, improvements, etc. that fall within the spirit and principles of the application are intended to be included within the scope of the application.

Claims (14)

1. An anti-counterfeiting verification method of an NFC electronic tag is characterized by comprising the following steps of:
the NFC tag supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC tag;
after receiving the wireless signal started by the NFC tag, the target device starts a verification terminal to generate a challenge signal by the verification terminal and sends the challenge signal to the NFC tag;
the Physical Unclonable Function (PUF) circuit in the NFC tag receives the challenge signal, the physical unclonable function of the PUF circuit generates a corresponding response value according to the challenge signal, and the NFC tag sends the response value corresponding to the challenge signal to the verification terminal;
the verification terminal compares the response value with a registration response value corresponding to the NFC tag identification identity; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification terminal, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
2. The anti-counterfeit authentication method of an NFC electronic tag according to claim 1, further comprising:
after the target device starts the verification terminal, the verification terminal acquires a user identity from the NFC tag and verifies the user identity of the NFC tag;
if the user identity of the NFC tag fails to pass the verification of the verification end, indicating that the NFC tag fails to pass the verification, and ending the verification; the verification terminal does not initiate a challenge signal to the NFC tag;
and if the user identity of the NFC tag passes the verification of the verification terminal, further generating a challenge signal by the verification terminal.
3. The anti-counterfeit authentication method of an NFC electronic tag according to claim 1, further comprising:
extracting a unique physical unclonable function of each NFC label from the chip of each NFC label for each target device, and storing the unique physical unclonable function in the verification terminal; the physical unclonable function refers to a physical structure with small differences formed by uncertain factors in the manufacturing process of the chip, wherein the physical structure enables the chip to have registration response values which are unique and different from other chips respectively when facing the same challenge signal.
4. The anti-counterfeit authentication method of an NFC electronic tag according to claim 1, further comprising:
and the NFC antenna arranged on the NFC tag receives the challenge signal and transmits the challenge signal to the Physical Unclonable Function (PUF) circuit in the NFC tag through a bus interface.
5. The anti-counterfeit authentication method of an NFC electronic tag according to claim 1, further comprising:
the physical unclonable function of the PUF circuit generates a corresponding response signal according to the challenge signal, the response signal is returned to the NFC circuit through a bus, and the NFC circuit carries out mathematical operation on the response signal to output a response value.
6. An anti-counterfeiting verification method of an NFC electronic tag is applied to an NFC electronic tag end and is characterized by comprising the following steps:
the NFC tag supplies power to target equipment of near field communication and initiates a wireless signal started by the NFC tag;
a Physical Unclonable Function (PUF) circuit in the NFC tag receives the challenge signal, and the physical unclonable function of the PUF circuit generates a corresponding response value according to the challenge signal; the challenge signal means that after receiving the wireless signal started by the NFC tag, the target device starts a verification terminal to generate the challenge signal by the verification terminal;
the NFC tag sends the response value to the verification terminal; comparing the response value with a registration response value corresponding to the NFC tag identification through the verification terminal; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification end, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
7. The method for anti-counterfeit verification of an NFC electronic tag according to claim 6, further comprising:
after the target device starts the verification terminal, the user identity of the NFC tag is returned to the verification terminal;
and after the user identity of the NFC tag passes the verification of the verification end, receiving a challenge signal initiated by the verification end to the NFC tag.
8. The method for anti-counterfeit verification of an NFC electronic tag according to claim 6, further comprising:
and the NFC antenna arranged on the NFC tag receives the challenge signal and transmits the challenge signal to the Physical Unclonable Function (PUF) circuit in the NFC tag through a bus interface.
9. The method for anti-counterfeit verification of an NFC electronic tag according to claim 6, further comprising:
the physical unclonable function of the PUF circuit generates a corresponding response signal according to the challenge signal, the response signal is returned to the NFC circuit through a bus, and the NFC circuit carries out mathematical operation on the response signal to output a response value.
10. An anti-counterfeiting verification method of an NFC electronic tag, which is applied to a target equipment end, is characterized by comprising the following steps:
the target equipment receives a wireless signal started by the NFC tag, starts a verification terminal, generates a challenge signal by the verification terminal and sends the challenge signal to the NFC tag;
the verification terminal receives the response value sent by the NFC tag; wherein the response value is a response value generated from the challenge signal by a physical unclonable function, PUF, circuit within the NFC tag;
the verification terminal compares the response value with a registration response value corresponding to the NFC tag identification identity; when the response value generated by the PUF circuit is equal to the registration response value, the NFC tag is proved to pass verification, otherwise, the NFC tag is not proved to pass verification; wherein, the registration response value refers to: and in the verification end, a unique response value obtained by responding the challenge signal by a physical unclonable function corresponding to the user identity of the NFC tag.
11. The method for anti-counterfeit verification of an NFC electronic tag according to claim 10, further comprising:
after the target device starts the verification terminal, the verification terminal acquires a user identity from the NFC tag and verifies the user identity of the NFC tag;
if the user identity of the NFC tag fails to pass the verification of the verification end, indicating that the NFC tag fails to pass the verification, and ending the verification; the verification terminal does not initiate a challenge signal to the NFC tag;
and if the user identity of the NFC tag passes the verification of the verification terminal, further generating a challenge signal by the verification terminal.
12. The method for anti-counterfeit verification of an NFC electronic tag according to claim 10, further comprising:
extracting a unique physical unclonable function of each NFC label from the chip of each NFC label for each target device, and storing the unique physical unclonable function in the verification terminal; the physical unclonable function refers to a physical structure with small differences formed by uncertain factors in the manufacturing process of the chip, wherein the physical structure enables the chip to have registration response values which are unique and different from other chips respectively when facing the same challenge signal.
13. An NFC electronic tag, comprising:
the NFC antenna is connected to the NFC circuit through an impedance matching transmission line; the NFC antenna is used for receiving and transmitting communication signals, and the communication signals comprise challenge signals from a verification end and response values generated by the challenge signals forwarded by the NFC circuit;
the NFC circuit is connected to the PUF circuit through a bus interface; the NFC circuit is a circuit with near field communication power supply energy collection, communication signal receiving and transmitting and communication protocol processing functions; wherein the communication signal transceiver comprises the challenge signal forwarded from the NFC antenna, and a response value generated according to the challenge signal is forwarded to the NFC antenna;
the PUF circuit is connected with the NFC circuit through a bus interface, receives the challenge signal forwarded by the NFC antenna, and returns to the physical unclonable function of the PUF circuit to generate a corresponding response value according to the challenge signal.
14. The NFC electronic tag of claim 13, further comprising:
the EEPROM storage circuit is connected with the NFC circuit through a bus interface; the EEPROM stores wireless communication protocol data of near field communication and user-defined data of a user of the NFC electronic tag;
the NFC circuit comprises an RF unit and a power supply unit;
the RF unit comprises a radio frequency power supply for near field wireless communication and an interface for communication signals.
CN202310457906.5A 2023-04-25 2023-04-25 Anti-counterfeiting verification method of NFC electronic tag and corresponding NFC electronic tag Pending CN116599673A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310457906.5A CN116599673A (en) 2023-04-25 2023-04-25 Anti-counterfeiting verification method of NFC electronic tag and corresponding NFC electronic tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310457906.5A CN116599673A (en) 2023-04-25 2023-04-25 Anti-counterfeiting verification method of NFC electronic tag and corresponding NFC electronic tag

Publications (1)

Publication Number Publication Date
CN116599673A true CN116599673A (en) 2023-08-15

Family

ID=87607089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310457906.5A Pending CN116599673A (en) 2023-04-25 2023-04-25 Anti-counterfeiting verification method of NFC electronic tag and corresponding NFC electronic tag

Country Status (1)

Country Link
CN (1) CN116599673A (en)

Similar Documents

Publication Publication Date Title
US11664997B2 (en) Authentication in ubiquitous environment
KR101240873B1 (en) Radio frequency identification system and method
EP3118776B1 (en) Security authentication method for hiding ultra high frequency electronic tag identifier
EP1755061B1 (en) Protection of non-promiscuous data in an RFID transponder
Hoepman et al. Crossing borders: Security and privacy issues of the european e-passport
AU2006203517B2 (en) Using Promiscuous and Non-Promiscuous Data to Verify Card and Reader Identity
US20140093144A1 (en) More-Secure Hardware Token
US20100153731A1 (en) Lightweight Authentication Method, System, and Key Exchange Protocol For Low-Cost Electronic Devices
US20100153719A1 (en) Lightweight Authentication Method and System for Low-Cost Devices Without Pseudorandom Number Generator
CN101976363A (en) Hash function based RFID (Radio Frequency Identification Devices) authentication method
CN101807318B (en) Mobile communication terminal, automatic transaction device, automatic transaction system and automatic transaction method
CN101945123A (en) RFID mobile phone and combination key technology-based authenticity identification method
CN103516517A (en) Production method, RFID transponder, authentication method, and reader device
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
CN106385320B (en) RFID anti-counterfeiting device and anti-counterfeiting method based on PUF and digital signature
US11477177B2 (en) Secure RFID tag identification
KR100734885B1 (en) Method for authenticating RFID tag and RFID server each other
CN110276423A (en) A kind of RFID Verification System for chip finger print of high encryption
US9495570B2 (en) Method for authenticating an RFID tag
CN104462926A (en) Intelligent card identity recognition method and system
CN113988103B (en) RFID identification method based on multiple tags
CN116599673A (en) Anti-counterfeiting verification method of NFC electronic tag and corresponding NFC electronic tag
CN111046413B (en) RFID communication method and system
CN109309916A (en) A kind of transmission of RFID data and Verification System and method
CN104954135A (en) Anti-copy anti-counterfeiting electronic tag authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination