KR20170047077A - Method and apparatus for confirmation of rfid - Google Patents
Method and apparatus for confirmation of rfid Download PDFInfo
- Publication number
- KR20170047077A KR20170047077A KR1020150147503A KR20150147503A KR20170047077A KR 20170047077 A KR20170047077 A KR 20170047077A KR 1020150147503 A KR1020150147503 A KR 1020150147503A KR 20150147503 A KR20150147503 A KR 20150147503A KR 20170047077 A KR20170047077 A KR 20170047077A
- Authority
- KR
- South Korea
- Prior art keywords
- electronic tag
- payload data
- user terminal
- information
- encryption
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10237—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the reader and the record carrier being capable of selectively switching between reader and record carrier appearance, e.g. in near field communication [NFC] devices where the NFC device may function as an RFID reader or as an RFID tag
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H04W4/008—
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a field of electronic tags, and more particularly, to an authentication method and apparatus capable of preventing unauthorized use of an electronic tag by using unique information of a user terminal.
With the recent development of information and communication technology, the information and communication environment is rapidly changing. The popularization of cellular phones has caused many changes in everyday life as well as changes in the communication environment. Particularly, as the use of smart phones has become commonplace, various functions are added to cellular phones and the development of technologies related to information communication using cellular phones And applications are being actively pursued.
An RFID (Radio Frequency Identification) technology is widely used in which personal information such as a credit card is stored in a user terminal such as a PDA (Personal Data Assistance) and a cellular phone, and payment processing can be easily performed.
Conventionally, when a user terminal including an electronic tag does not perform a separate authentication procedure or performs an authentication procedure in the case of using an electronic tag, since it proceeds from the server side instead of the user terminal side, When replicating in the terminal, the replicated electronic tag could be used illegally.
The present invention provides an authentication method and apparatus that can prevent unauthorized use of an electronic tag by using unique information of a user terminal.
The electronic tag authentication method of the present invention includes the steps of: performing encryption of payload data using a first cryptographic key including information on a unique number of a user terminal and a second cryptographic key including information for encryption; And storing the encrypted payload data in an electronic tag of the user terminal.
The RFID tag authentication apparatus of the present invention further includes a storage unit for storing a first cryptographic key including information on a unique number of the user terminal and a second cryptographic key including information for encryption; A processor for performing encryption of payload data using the second cipher key, and an electronic tag for storing the encrypted payload data.
According to the present invention, it is possible to enhance the complement of the electronic tag by using the unique information of the user terminal, and to supplement and reinforce it easily because it uses the unique information of the user terminal.
1 is a diagram illustrating an authentication process performed by a service providing server according to the related art.
BACKGROUND OF THE INVENTION 1. Field of the Invention [0001]
3 is an exemplary view illustrating an encrypted payload data forming process according to an embodiment of the present invention.
4 is a diagram illustrating an example of a payload data decoding process according to an embodiment of the present invention.
5 is a flowchart illustrating a procedure of an electronic tag authentication method according to an embodiment of the present invention.
Hereinafter, some embodiments of the present invention will be described in detail with reference to exemplary drawings. It should be noted that, in adding reference numerals to the constituent elements of the drawings, the same constituent elements are denoted by the same reference symbols as possible even if they are shown in different drawings. In the following description of the present invention, a detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear.
RFID (Radio Frequency Identification) is a technology that integrates all the processes from production to sales into a microchip and tracks it on radio frequency. It is called "smart tag", "electronic label" "And" NFC (Near Field Communication) tag ".
Electronic tags are the next generation recognition technology to replace barcodes that are generally used for merchandise management in the distribution field. An electronic tag is composed of a reader that reads and decodes data and a tag that provides information, and allows a reader to read information of a tag through an antenna. In addition, it can be integrated with information system in connection with satellite or mobile communication network.
In Korea, electronic tags are being established as a system for collecting public transportation charges. The scope of utilization is not only in the field of distribution but also in animal tracking devices, automobile safety devices, personal access and access permission devices, electronic fare collection devices, It is expected to spread to various fields.
1 is a diagram illustrating an authentication process performed by a service providing server according to the related art. 1, a plurality of
In one embodiment, when receiving a call from a third party using a call forwarding function using information recorded in the
2 is an exemplary diagram showing an electronic tag authentication apparatus according to an embodiment of the present invention.
2, the electronic
The
When storing payload data which is information for using a specific service in the
FIG. 3 is a view illustrating an encrypted payload data forming process according to an embodiment of the present invention. As an example, when a mobile credit card is issued from a
In another embodiment, when a mobile credit card is issued from a
When receiving the signal requesting the use of the
4 is a diagram illustrating an example of a payload data decoding process according to an embodiment of the present invention. In an embodiment, when a specific user desires to use the mobile credit card using the
As another embodiment, when a specific user desires to use the mobile credit card using the
The
The
5 is a flowchart illustrating a procedure of an electronic tag authentication method according to an embodiment of the present invention.
5, when a specific user desires to use a mobile credit card by using the
Although the method has been described through particular embodiments, the method may also be implemented as computer readable code on a computer readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored. Examples of the computer-readable recording medium include a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like, and may be implemented in the form of a carrier wave (for example, transmission via the Internet) . In addition, the computer-readable recording medium may be distributed over network-connected computer systems so that computer readable codes can be stored and executed in a distributed manner. In addition, functional programs, codes, and code segments for implementing the above embodiments can be easily deduced by programmers of the present invention.
While specific embodiments have been described, these embodiments are provided by way of illustration and are not to be construed as limiting the scope of the disclosure. The novel methods and apparatus of the present disclosure can be implemented in various other forms, and it is possible to variously omit, substitute, and alter the embodiments disclosed herein without departing from the spirit of the present disclosure. It is intended that the appended claims and their equivalents be interpreted as embracing all such forms and modifications as fall within the scope and spirit of this disclosure.
111, 131, 230: an
120: Service providing server 200: Electronic tag authentication device
210: storage unit 220:
230: Electronic tag 240:
310: payload data
320: information on the unique number of the user terminal
330: Authentication key, which is information for encryption
340: Encrypted payload data
Claims (11)
Performing encryption of payload data using a first cryptographic key including information on a unique number of a user terminal and a second cryptographic key including information for encryption;
Storing the encrypted payload data in an electronic tag of the user terminal
And the electronic tag authentication method.
Determining whether the electronic tag is valid or invalid by performing a first authentication process using the first cryptographic key and the second cryptographic key when receiving a use request of the electronic tag;
Performing decryption of the encrypted payload data when it is determined that the electronic tag is valid,
Receiving a service based on the decrypted payload data from the server when the electronic tag is determined to be valid through a second authentication process by the server
Further comprising the steps of:
The information on the unique number of the user terminal may be,
Wherein the electronic tag authentication information includes at least one of a Media Access Control (MAC) address, an International Mobile Subscriber Identity (IMSI), an Integrated Circuit Card ID (ICCID), an International Mobile Equipment Identity (IMEI) and a serial number of the user terminal.
Wherein the step of performing encryption of the payload data comprises:
The first cryptographic key is added to the header value of the payload data to form packet data, the packet data is divided into bits, and the order of the divided bits is changed using the second cryptographic key To form the encrypted payload data
And the electronic tag authentication method.
Wherein the step of determining whether the electronic tag is valid or invalid by performing the first authentication process comprises:
Dividing the encrypted payload data in units of bits and reordering the arrangement order of the divided bits using the second cryptographic key to form packet data including a header value and payload data, , ≪ / RTI &
And determining whether the electronic tag is valid or invalid by determining whether the header value matches the information about the first cipher key.
A storage unit for storing a first encryption key including information on a unique number of a user terminal and a second encryption key including information for encryption;
A processor for performing encryption of payload data using the first encryption key and the second encryption key,
An electronic tag that stores the encrypted payload data
And the electronic tag authentication device.
Wherein,
When receiving the use request of the electronic tag, performs a first authentication process using the first cryptographic key and the second cryptographic key to determine whether the electronic tag is valid or invalid, and determines that the electronic tag is valid And decrypts the encrypted payload data when the encrypted payload data is decrypted.
The information on the unique number of the user terminal may be,
Wherein the authentication information includes at least one of a Media Access Control (MAC) address, an International Mobile Subscriber Identity (IMSI), an Integrated Circuit Card ID (ICCID), an International Mobile Equipment Identity (IMEI), and a serial number of the user terminal.
Wherein the information for the encryption includes a random number for changing the arrangement order of the divided bits by dividing the encryption target information into units of bits.
Wherein,
Storing the first cryptographic key as a header value of the payload data to form packet data, dividing the packet data into units of bits, and changing an arrangement order of the divided bits using the second cryptographic key Thereby forming the encrypted payload data.
Wherein,
Dividing the encrypted payload data in units of bits and reordering the arrangement order of the divided bits using the second cryptographic key to form packet data including a header value and payload data, And determines whether the electronic tag is valid or invalid by determining whether the header value matches information about the first cipher key stored in the storage unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150147503A KR20170047077A (en) | 2015-10-22 | 2015-10-22 | Method and apparatus for confirmation of rfid |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150147503A KR20170047077A (en) | 2015-10-22 | 2015-10-22 | Method and apparatus for confirmation of rfid |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170047077A true KR20170047077A (en) | 2017-05-04 |
Family
ID=58743419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150147503A KR20170047077A (en) | 2015-10-22 | 2015-10-22 | Method and apparatus for confirmation of rfid |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170047077A (en) |
-
2015
- 2015-10-22 KR KR1020150147503A patent/KR20170047077A/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101404673B1 (en) | System for authenticating radio frequency identification tag | |
CN107181714B (en) | Verification method and device based on service code and generation method and device of service code | |
KR100702971B1 (en) | Method and system for encrypting Radio-Frequency-Identification Tag using Broadcast Encryption Type | |
EP3698535A1 (en) | Privacy preserving tag | |
US20070150736A1 (en) | Token-enabled authentication for securing mobile devices | |
US20160034728A1 (en) | Rfid tag and reader characteristic determination using group keys | |
KR101449611B1 (en) | System for authenticating rfid(radio frequency identification) tag | |
CN107302435B (en) | Identity information processing method and system and corresponding server | |
US7620187B1 (en) | Method and apparatus for ad hoc cryptographic key transfer | |
Cheng et al. | A secure and practical key management mechanism for NFC read-write mode | |
KR100728629B1 (en) | System and Method for Preventing Forgery of RFID Tag | |
KR100817222B1 (en) | Method for encrypting/decrypting electronic product code and rfid system using the same | |
KR101162196B1 (en) | System and Method for Assigning Dynamic ID to RFID Tag, RFID Tag, RFID Terminal and Recording Medium | |
US10511946B2 (en) | Dynamic secure messaging | |
KR20070006526A (en) | System and method for assigning dynamic id to rfid tag, rfid tag, rfid terminal and recording medium | |
US9715586B2 (en) | Read/write device and transponder for exchanging data via an electromagnetic field | |
CN110533128B (en) | Encryption-based anti-counterfeiting traceability data processing method, device, system and medium | |
US8320570B2 (en) | Apparatus and method for generating secret key | |
Song et al. | Security improvement of an RFID security protocol of ISO/IEC WD 29167-6 | |
KR101162227B1 (en) | RFID Terminal | |
KR20170047077A (en) | Method and apparatus for confirmation of rfid | |
KR101426223B1 (en) | Method for checking confidential information using smartcard and smart terminal, and computer-readable recording medium for the same | |
KR101077860B1 (en) | RFID tag | |
CN109951423B (en) | System, method and device for identity authentication and server | |
JP5514780B2 (en) | COMMUNICATION SYSTEM, TRANSMISSION DEVICE, AND RECEPTION DEVICE |