TW200941993A - A RFID systems conformation to EPC class 1 generation 2 standards ownership transfer scheme - Google Patents

A RFID systems conformation to EPC class 1 generation 2 standards ownership transfer scheme Download PDF

Info

Publication number
TW200941993A
TW200941993A TW97111634A TW97111634A TW200941993A TW 200941993 A TW200941993 A TW 200941993A TW 97111634 A TW97111634 A TW 97111634A TW 97111634 A TW97111634 A TW 97111634A TW 200941993 A TW200941993 A TW 200941993A
Authority
TW
Taiwan
Prior art keywords
message
reader
user
label
server
Prior art date
Application number
TW97111634A
Other languages
Chinese (zh)
Other versions
TWI350093B (en
Inventor
Chin-Ling Chen
Original Assignee
Univ Chaoyang Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Chaoyang Technology filed Critical Univ Chaoyang Technology
Priority to TW097111634A priority Critical patent/TWI350093B/en
Publication of TW200941993A publication Critical patent/TW200941993A/en
Application granted granted Critical
Publication of TWI350093B publication Critical patent/TWI350093B/en

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

In, this patent, we first based on APF (Authentication Processing Framework) to propose a mutual authentication protocol, which conforms the EPCglobal class 1 generation 2 standards between readers and tags. Recently, RFID system has become a popular application. In spite of many RFID applications for ownership transfer are appeared in recent literatures. Those applications do not conform the EPCglobal class 1 generation 2 standards. Therefore, we are interested to propose an ownership transfer protocol which conforms the EPCglobal class 1 generation 2 standards and bases on X. 509 certificate. We involve the certificate concept in our patent and reduce the computation complexity between readers and tags. We can complete the following goals: (1) The mutual authentication between readers and tags. (2) Assure the personal privacy. (3) Conforms the EPCglobal class 1 generation 2 standards. (4) Against various attack. We only use the lightweight operation such that the backend database loading can be reduced, lighten the tags' computation, and against the various attacks.

Description

200941993 九、發明說明: 【發明所屬之技術領域】 本七月疋關方;-種以行動裝置為基礎的在企業或組織 内郤王方位的數位内容保護方法’透過適當的授權認證以及 行動裝置的保護軟硬體機制,企業或組織内部員卫可在任何 τ間地點存取企業或組織内部的數位内容,而企業或組織 内部的數位内容也能受到安全性的保護。 【先前技術】 ❹200941993 IX. Description of the invention: [Technical field to which the invention pertains] This July is a related party; a digital content protection method based on mobile devices based on mobile devices in the enterprise or organization' through appropriate authorization and mobile devices Protecting the hardware and software mechanism, the enterprise or organization insider can access the digital content inside the enterprise or organization in any place, and the digital content inside the enterprise or organization can also be protected by security. [Prior Art] ❹

近年來,無線射頻辨識(radi0 frequency idemificati〇n, RFID)技彳㈣興起相當受到重視,由於RFm所帶來的商機相 當魔大,全球莫不積極發展這方面的應用。據市場研究公司 Am Research的預估顯示,灯出每年會有49%以上的產值 成長率,Μ 2012年的產值預估可達572億美元,其令軟硬 體大約占430億美元’而服務產業則有142億美元;未來應 用的市場包括全球供應鏈管理、行動商務、健康醫療照護 又通運輸、國防及貿易通道安全等。由於RFID向來被稱; 本世紀的十大重要技術之一,預期未來RFID電子標籤上^ 以讀/寫/記憶,從物件端承受資訊的儲存及過去許多操作十 的業務,將因為RFID的應用,而變得更加自動化,進一 + 改變人類的生活型態。 僅管RFID系統技術的興起帶來便利性,卻也出現許多 安全上的隱憂。本發明的目的是透過資訊安全相關技術的研 200941993 时’先探討符合國際商品條碼標準組織第二代第—類 (EPCglobal Class 1 Generation 2 )標準的認證機制,再加上 產權轉移的管理協定,希望能建構出一個安全的Rfid系統。 過去RFID之應用因為缺乏國際標準與運作規範,所以 大夕侷限於個別企業内部之使用,其實際效益相對有限。铁 而目月RFID之應用在國際商品條碼標準組織 之推動下’已經朝全球運籌之共通技術標準與運作規範發 展。咖抑㈤目前儼然已成為RFID新興應用之主要標準制 訂機構’以及推廣的領導者。也因此Epcgk>bai的叩出網 路應用系統佔有报重要的地位,以下列出企業内部之咖 Network架構及其功能: ⑴電子產品碼(Electr〇niC PrQduct c〇de, Epc). 是個可辨識特定物件的辨識號碼,請參閱圖-,EPC是以 一進位的表不方式,其《一船的炊斗於金/ 的才。式係舉例如電子產品碼範In recent years, the rise of radio frequency identification (RFID) technology (IV) has received considerable attention. Due to the considerable business opportunities brought by RFm, the world is not actively developing this application. According to estimates by market research firm Am Research, the annual output growth rate of the lamp will be more than 49%, and the output value in 2012 is estimated to be 57.2 billion US dollars, which makes the software and hardware account for about 43 billion US dollars. The industry has $14.2 billion; future applications include global supply chain management, mobile commerce, health care and transportation, and defense and trade channel security. Because RFID has always been called; one of the ten important technologies of this century, it is expected that in the future RFID electronic tags will be read/write/memory, from the end of the object to the information storage and many operations in the past ten, because of the application of RFID And become more automated, enter a + change the human life style. Although the rise of RFID system technology brings convenience, there are also many security concerns. The object of the present invention is to firstly explore an authentication mechanism conforming to the International Product Bar Code Standards (EPCglobal Class 1 Generation 2) standard through the research of information security related technology in 200941993, together with a management agreement on property rights transfer. I hope to build a secure Rfid system. In the past, due to the lack of international standards and operational specifications, the application of RFID was limited to the use of internal enterprises, and its actual benefits were relatively limited. The application of RFID in the future is being promoted by the international commodity bar code standards organization. Coffee (5) is now the leading standard for RFID emerging applications and the leader of promotion. Therefore, Epcgk>bai's outbound network application system has an important position. The following is a list of the internal coffee network architecture and its functions: (1) Electronic product code (Electr〇niC PrQduct c〇de, Epc). It is identifiable. For the identification number of a specific object, please refer to the figure--the EPC is a way of showing the position of a ship. Style, such as electronic product code

例10 : vtnsion Header -* "τ a叭α月ij仰 的是何種EPC版本格式,可公# Λ Τ刀成64, 96,256位元三福 式。使用64位元編碼的目的是 曰旳疋為了減少Tag存儲量從 降低Tag生產成本;μ位元缢说目,丨* w 疋編碼則為取得性能與成本 間的平衡;但為了滿足為世立 上任思物件提供標識的 標,則必須採用至少256位元編碼。 200941993Example 10: vtnsion Header -* "τ a αα月 ij 仰 is the EPC version format, can be public # Λ Τ into 64, 96, 256-bit three blessing. The purpose of using 64-bit encoding is to reduce the Tag production cost in order to reduce the amount of Tag storage; the μ bit 缢 目 丨, 丨 * w 疋 encoding is to achieve a balance between performance and cost; If the object of the object is provided with an identifier, it must be encoded with at least 256 bits. 200941993

Domain Manager :辨識產品製造商12。 0 b j e c t C 1 a s s ·辨識產品的型號1 3。Domain Manager: Identify product manufacturer 12. 0 b j e c t C 1 a s s • Identify the model number 1 of the product.

Serial Number :辨識產品的唯一序號14。 (2) 電子標籤(Tag)和讀碼器(Reader):每一個内嵌 有RFID晶片的Tag中儲存一個Epc ;而讀碼器則是將讀 到的辨識號碼傳輸至中介軟體應用系統,擷取相對應的產 品貧訊。 (3) EPC中介軟體(Middleware) :EPC中介軟體處理 RF ID讀碼器的資料讀取,和企業現有應用系統間的資料 交換,並依照設定好的商業邏輯來處理各個讀取事件 (reading event),以及進階的分析運用。中介軟體並負 貝即時讀取事件所應誘發的提醒功能,管理讀取資料和 EPC 資 服務(EPC Information Service,EPC-IS)、以 及現有企業應用系統間的溝通介接’扮演rF〖D標籤和應 用程式之間中介的角色。從應用程式端使用中介軟體所提 供一組共通的應用程式介面(Application Interf ace ), 即能連到RF ID讀碼器,讀取RF ID標籤資料。如此一來, 即使儲存RFID標籤情報的資料庫軟體或後端應用程式增 加或改由其他軟體取代,或者讀寫RF 10讀碼器種類增加 等等情況發生時,應用端不需修改也能處理,省去多對多 連結的複雜維護問題。 8 200941993 (4) 物件名稱解析服務(〇bjectlve Naming Serviee, ONS): ‘ EPG標籤對於—個開放式、全球性的追縱物品網路需 要一些特殊的網路結構。因為標籤中只儲存了電子產品 •碼’電腦還需要-些將電子產品碼對應到商品資訊的方 法,這個角色就由物件名稱解析服務(〇bject “ΜSerial Number : The unique serial number of the identified product. (2) Electronic tag (Tag) and reader (Reader): Each Eg embedded in the RFID chip stores an Epc; and the reader reads the read identification number to the intermediary software application system. Take the corresponding product news. (3) EPC mediation software (Middleware): EPC mediation software processing RF ID reader data reading, and the company's existing application system data exchange, and according to the set business logic to handle each read event (reading event ), as well as advanced analysis and application. The mediation software and the reminder function that should be induced by the instant read event, the management of the read data and the EPC Information Service (EPC-IS), and the communication between the existing enterprise application systems' play the role of rF〗 D The role of mediation between the application and the application. A common application interface (Application Interf ace) is provided from the application side using the mediation software, which can connect to the RF ID reader and read the RF ID tag data. In this way, even if the database software or the back-end application storing the RFID tag information is added or replaced by another software, or the type of the read-write RF 10 code reader is increased, etc., the application end can be processed without modification. , eliminating the complicated maintenance problems of many-to-many links. 8 200941993 (4) Object name resolution service (〇bjectlve Naming Serviee, ONS): ‘EPG tags require a special network structure for an open, global network of tracking items. Because only the electronic products are stored in the label. • The code computer also needs some methods for matching the electronic product code to the product information. This role is handled by the object name resolution service (〇bject “Μ

SerV1Ce,0NS)來擔當。所以〇NS其主要功能在於提供 Φ EPC碼的查詢服務,負責將EPC碼對應到產品資訊的路徑 上也就疋田我們對某件商品感興趣時,可以根據商品上 的EPC碼詢問ONS,〇NS就會告知此商品的資訊放在何處。 〇NS的設計採用DNS方式,為階層式的架構。在verisign (美國豕專注於多種網路基礎服務的上市公司)的研究 中心,有負責統管全球的統籌性0NS(R〇〇t 〇NS);而在不 同的洲也會有統管各洲的R〇〇t 〇NS。在臺灣的R〇〇t ❹目刖疋由Verisign委由宏碁公司管理,此R〇〇t 〇NS負責 !凊所有商品製造商的區域性〇NS(L〇cal 〇NS)註冊服務。 (5) EPC 資訊服務(Epc Inf〇rmati〇n Service , EPC-IS): IS所扣演的角色是epc Network中的資料儲存 中。,所有與EPC有關的資訊都是放在Epc—IS中,除了 貝料緒存的功能外,也提供資料的分享功能,從資訊系統 200941993 觀點來看EPC_IS,其本身不一定是一個實體的資料庫, 主要是透過移轉(Adapter)連到各個異質的資料庫實體, 真正/、 EPC有關的商品資訊是放在這些實體資料庫當 中。EPC-is可比擬網際網路架構當中提供訊息的各式網 • 頁。 (6)電子產品碼動態資料追蹤與查詢服務(EpcSerV1Ce, 0NS) to take responsibility. Therefore, the main function of 〇NS is to provide Φ EPC code query service, which is responsible for the EPC code corresponding to the path of product information. When we are interested in a certain product, we can ask ONS according to the EPC code on the product. Will tell you where the information for this item is placed. 〇NS is designed in a DNS manner and is a hierarchical architecture. In the research center of Verisign (a US-listed company that specializes in multiple network-based services), it has the responsibility of managing the global coordinating 0NS (R〇〇t 〇NS); in different continents, there will also be R in all continents. 〇〇t 〇NS. The R〇〇t project in Taiwan is managed by Verisign Commission Acer, which is responsible for the regional 〇NS (L〇cal 〇NS) registration service for all commodity manufacturers. (5) EPC Inf〇rmati〇n Service (EPC-IS): The role played by IS is in the data storage in the epc Network. All EPC-related information is placed in Epc-IS. In addition to the function of the material storage, it also provides the data sharing function. From the point of view of the information system 200941993, EPC_IS is not necessarily an entity data. The library is mainly connected to each heterogeneous database entity through an Adapter. The real/, EPC-related product information is placed in these entity databases. EPC-is can be compared to a variety of web pages that provide information in the Internet infrastructure. (6) Electronic product code dynamic data tracking and query service (Epc

Discovery Service,EPC-DS): φ 廠商物品的流通資訊是記錄在EPC-IS的觀察剖析 (〇bservation Profile)上,在 Epc一網路(Epc 的設計中EPC-DS則是幫助廠商將動態資訊可以互相分 享。EPC-DS知道某個EPC碼的動態資訊儲存在那些Epc—Is 中。其疋位類似網際網路上的搜尋引擎,epc—ds整合各 個EPC-IS上所記錄的EPC資料,提供EPC物件‘‘跟踪查 詢系統(Track & Trace ) ”的追蹤,提供跨越整體供應 ❹ 鏈、擁有連續產品資料之多元EPC- IS之查詢服務。 凊參考圖一,以下舉例介紹E P C N e t w 〇 r k如何來記錄 商品的資訊,以及說明如何查詢商品的資訊,根據Discovery Service, EPC-DS): φ The circulation information of the manufacturer's items is recorded on the EPC-IS 剖bservation Profile. In the Epc network (EPC-DS is designed to help manufacturers to send dynamic information). Can share with each other. EPC-DS knows that the dynamic information of an EPC code is stored in those Epc-Is. Its location is similar to the search engine on the Internet, and epc-ds integrates the EPC data recorded on each EPC-IS. EPC object 'Track & Trace' tracking, providing multi-EPC-IS query service with continuous product information across the entire supply chain. 凊 Referring to Figure 1, the following example shows how EPCN etw 〇rk To record the information of the product and how to query the information of the product, according to

Verisign 所公佈的「The EPC Network: Enhancing the Supply Chain」這篇白皮書中,簡要說明EPC Network 運作的步驟。 1.商品製造商21將寫入EPC的RFID標籤嵌入到所符 200941993 合的商σ口 20上’此時ρρρ p箱斗 τ EPC已預先注冊於〇Ns 2ιι上。而 商品20的相闕資訊,諸如製造曰期、有效曰期以及在整 個物流供應鏈中的流向等,都會储存於商品製造商心 EPC-IS t。(當EPC]S有更新商品資訊的動作時,便會 向ONS 211進行註冊,以作為後續商品追縱。) 2 ·商品2 0會經由物流供庫 4鏈22轉銷到一般通路門市 23販售。 3. 當到達供應鏈的一 .u 卜個點日守,則商品20的EPC會 被項取,亚且記錄在通路 。日7 is中。當通路門 市23的EPC-IS新增了商品2〇 貝5扎後’便會向ONS 231 進仃註冊,以作為後續的商品追蹤。 4. 當一般消費者24要杳咱 & 要—珣特疋商品的資訊時,便會 更向上層的〇j\jS 241杳祂I , ΠΝς ^Ucal 0NS的位置,接下來Ucal 便έ查詢儲存商品資$ 貝汛的製造商EPC-IS位置,最後 便疋向各個存有商品資訊 wc-is取仟完整的商品資 訊0 、 從上面的說明可以看 出商αϋ的詳細資訊都是儲存在 匕尸US内,標籤本身僅有 、 商°口的EPC代碼,0NS則是記錄 亚乂供該組EPC碼可以在行由 在何處取得詳細資料的URL路徑, 亦即EPC - I S的位址,而所f μ 厅有的ONS則被統管於更高層次 、-允命官理的Root 〇NS 25,D面Μ v、要頃取各EPC-IS的資訊後, 200941993 就 可以得到產品的原始資料(像是製造曰 期、有效曰期) 訊(包括這個商品經過那些配 往何地等詳細的商品流程資 也可以查询到商品的變動資 送中心、經銷商、以及將運 料)。 二口此,ζ、要侍到存在標籤本身的Epc代碼,即可了解 舌玄產品的詳細資訊,石為·她放士 ' 貝K如何控官存取標籤的£PC代碼自然成 為重要的議題。 【發明内容】 、本么月的目的在於提供一種RF I D系統符合EPC第二 代第-類的產權轉移方法,其可達成下列各項需求: (1) 交互認證; (2) 確保個人隱私; )協疋内谷符合 f:PCgi〇bai Class 丨 Generati〇n 2 之工業標準; )方止各種攻擊,利用交互認證的觀念,確保標籤 矛。貝碼器之間的存取是安全的,本發明的方法同 寺也忐降低資料庫的負擔,並且順利把物件轉移 給新擁有者,確保交易的安全。 本發明是鑑於傳統技術缺點所為之發明,由於無線 頻辨識系^ t ' y、、’’非接觸讀寫的特性,造成系統安全上的隱憂。 —個言免古+ τ 文全的標籤會洩漏裡面的資訊給鄰近的讀 器,對储田土 . ' 用者的隱私造成威脅。所以,本發明透過資訊安 12 200941993 全上交互認證的概念, 叹汁出一個安全的存取環产 和讀碼器都必須向資料 兄,彳示戴 4庫註冊,標籤可以知道讀碼器The white paper "The EPC Network: Enhancing the Supply Chain" published by Verisign briefly describes the steps of the EPC Network. 1. The merchandise manufacturer 21 embeds the RFID tag written in the EPC into the quotation 20 of the 200941993. At this time, the ρρρ p bin τ EPC is pre-registered on 〇Ns 2ιι. The relative information of the commodity 20, such as the manufacturing cycle, the effective flood season, and the flow in the entire logistics supply chain, will be stored in the commodity manufacturer's heart EPC-IS t. (When EPC]S has the action of updating the product information, it will register with ONS 211 as a follow-up product.) 2 · Item 2 0 will be resold to the general channel store 23 through the logistics supply 4 chain 22 Sold. 3. When a .u point in the supply chain is reached, the EPC of item 20 will be taken, and recorded in the path. Day 7 is in. When the EPC-IS of Pathway 23 adds a new item 2, it will be registered with ONS 231 as a follow-up product tracking. 4. When the average consumer 24 wants to 杳咱 要 要 珣 珣 珣 珣 \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ I I U U U U U U U U U U U U U U U U Store the EPC-IS position of the manufacturer of the goods, and finally take the complete product information from each stored product information wc-is. 0 From the above description, it can be seen that the details of the business αϋ are stored in In the corpse US, the label itself has only the EPC code of the quotient port, and the 0NS records the URL path of the 乂 乂 for the EPC code of the group to obtain detailed information, that is, the address of the EPC-IS. And the ONS of the f μ hall is managed at a higher level, the Root NS NS 25, the D face Μ v, the information of each EPC-IS, the original product can be obtained in 200941993 Information (such as the manufacturing period, effective period) (including the goods through the detailed merchandise flow, such as where you can also find the goods transfer center, dealers, and will be shipped). Two, this, you have to wait for the Epc code of the label itself, you can understand the detailed information of the tongue Xuan products, Shi Wei · her sergeant's how to control the official's access to the label's £PC code naturally becomes an important issue. . SUMMARY OF THE INVENTION The purpose of this month is to provide an RF ID system that complies with the EPC second-generation first-class property rights transfer method, which can achieve the following requirements: (1) interactive authentication; (2) ensuring personal privacy; ) Coordination Valley meets the industry standard of f:PCgi〇bai Class 丨Generati〇n 2;) to stop all kinds of attacks, use the concept of interactive authentication to ensure label spears. Access between the coders is safe, and the method of the present invention also reduces the burden on the database and smoothly transfers the objects to the new owner to ensure the security of the transaction. The invention is based on the shortcomings of the conventional technology, and the wireless frequency identification system ^t 'y, '' non-contact read and write characteristics cause system security concerns. - The words of the ancient + τ text will leak the information inside to the neighboring readers, and threaten the privacy of the users. Therefore, the present invention through the information security 12 200941993 all-in-one interactive authentication concept, sighs a safe access ring and the reader must be registered with the data brother, the display of the library, the tag can know the code reader

合法,頃碼器也可以得知挪》 D 才示戴疋否有經過註冊,傭 合法註冊才能進行溝诵,右v 又方皆為 了使㈣的隱私和系統 的女全。而對於如何利 ^ 7利用貪机安全技術對標籤的存取權進 行管控機制,經過本笋 不^明香視過這些技術,大都面萨 幾點問題: mLegally, the coder can also know that the "D" indicates that Dai Dai has been registered, the legal registration can be carried out by the servant, and the right v is also the privacy of the (4) and the system. However, for how to use the greedy security technology to control the access rights of the tags, after the bamboo shoots, I have seen these technologies, and most of them have problems: m

有些方法的標籤需要進行公開金鑰的加密運算,不 —EPCglobal Class 1 Generation 2 的標準規 範0 2.標籤計算成本過高。 3 ·資料庫讀取標籤負擔太大。 4.使用者位置隱私保護不足。 5 ·身份代碼匿名化不夠。 ® 6 ·备易複製標籤和欺騙讀碼器的攻擊保護不足。 抵擒阻!&服務(Deniai serviCe,DoS)攻擊能力 不足。 值付一提的是目前大部份文獻所提出的方法都假設 RFID電子標籤是屬於智慧型標籤(smart Tag),而對智慧 型RF I D電子標籤做更明確的定義有以下幾點的論述: 電子標籤與讀取器的能見度(Visibility of 13 200941993 RFID Tags and RFID Readers): 在整個RFID系統的運作架構下,必須能定義产 Θ竣電 子標籤上的資料可被讀取的狀態,像是哪些資料可永^ 讀取或哪些資料受到保護,這在電子標籤被核發出破 , I郡要 應讀 明確定義,而讀取器被授權可讀取哪些電子標籤也是 定義清楚。 and 2*RFID電子標籤的存取方式Uccess ❿ Modification 〇f RFID Tag Data): 必須有適當的規劃設計,也就是電子標籤的所 屬人可用何種方式合法存取電子標籤的資訊。 3·採用適當的隱私保護機制(UsageSome methods require a public key encryption operation, not the standard specification of EPCglobal Class 1 Generation 2. The label calculation cost is too high. 3 · The database reads labels too much. 4. User location privacy protection is insufficient. 5 · Identity code anonymization is not enough. ® 6 • The attack protection of the easy-to-replicate tag and the spoofed code reader is insufficient. Resist the resistance! The & service (Deniai serviCe, DoS) has insufficient attack capabilities. It is worth mentioning that most of the methods proposed in the current literature assume that RFID tags are smart tags, and the definition of smart RF ID tags is more clearly defined as follows: Visibility of 13 200941993 RFID Tags and RFID Readers: Under the operating framework of the entire RFID system, it must be possible to define the status of the information on the electronic label that can be read, such as The data can be read permanently or which data is protected. This is done when the electronic tag is broken, and the county is clearly defined, and the electronic tags that the reader is authorized to read are also clearly defined. And 2* RFID electronic tag access method Uccess ❿ Modification 〇f RFID Tag Data): There must be appropriate planning and design, that is, the method by which the owner of the electronic tag can legally access the electronic tag. 3. Adopt appropriate privacy protection mechanism (Usage

Privacy-Enhancing Technologies) : 〇 電子標籤的所有權歸屬必須有一套運作機制,讓所有 權能合理轉移,而所有權人職掌握最重要的關鍵秘贫 e (key)來決定電子標籤内容的存取限制。 4.個人資料的保密(c〇nfiden y UI rersona 1Privacy-Enhancing Technologies): 所有权 The ownership of electronic tags must have a set of operational mechanisms that allow all rights to be transferred reasonably, and the ownership of the most important key e-keys to determine the access restrictions of electronic tag content. 4. Confidentiality of personal data (c〇nfiden y UI rersona 1

Data): 定安 在RFID電子標籤上有任何個人資料,必須有 全程度的加密。 然而,目 刖應用普飞和低成本的RFID標籤並不是所 謂的智慧型標籤’’ ς『u r + T » c ' 都還在理 職str art Tag (這一類的設計 14 200941993 确研九為主),由於目前RFID標籤上的晶片具有。 3趣輯間 約為50 0至5000個,而其中大部分是用來做 *、碎俘和傳 ❹ 輸功能,剩下能做安全機制的邏輯閘數量非常有限,不。 能會有在現階段的RFID標籤上做到很複雜的運算不Z RFID標籤視為“ SmartTag,’,對目前實際現況運作有困 難’因此本發明擬提出—種符合奸⑷相聊伽_ 2 c 1 ass 1的產權轉移協定,透過交互驗證方式的防偽機 制使仔本發明所提出的方法能達到以下幾點目標: 1 ·可用於低成本、運算能力有限的丨D標籤。 2 ·軚籤不集要做複雜運算,存取速度可以很快速。 可乂確保RFID標籤的資料完整性。 4·可以防止RFID標籤被大量複製。 ° /、有所有權的概念,使得商品可以移轉給他 ❹ 6·防止非法標籤存取。 7·防止假扮標籤攻擊讀碼器, 8. 防止中間人攻擊。 9. 防止使用者嗜好隱私之追蹤攻擊。 1〇.防止使用者位置隱私之追蹤攻擊。 11 做到標鐵及靖石民口口 織次碼斋間交互認fi.。 1 2 .符合 gpp Γ ass 1 Generation 2 標準。 15 200941993 1 3.減少資料庫讀取負擔。 類似產品被提出 利用數位憑證及 建構一個安全的 本發明的重點,就是在仿間尚無看到 的情況下’研究一個合宜的解決方案, RF ID的技術’透過產品產權轉移的技術 交易平台。 【實施方式】 請參考圖三,本發明提出之方法分成四個階段來說 〇 明:1 ·註冊階段;2.交互認證階段;3 ·產權轉移要求階段; 4.更新伺服器端之產權轉移階段。以下本發明將針對這四 個階段來說明這種架構流程。 首先依據需求,本發明根據提出的方法中會使用到的 一些符號先行介紹: :%是—個暫時的字組;&是一個密鑰。如果標籤 向資料庫註冊時,他們將得到(^ )。 ❿ ® : 互斥或閘運算。 m〇: 讀碼器產生的隨機亂數。 ㈣憑證,當使用者購買了物件尤即擁有憑證Data): Ding An Any personal data on the RFID electronic tag must be fully encrypted. However, witnessing the application of general and low-cost RFID tags is not the so-called smart tag '' ς ur + T » c ' are still in the str art Tag (this type of design 14 200941993 ), since the wafer on the current RFID tag has. 3 The interesting series is about 50 to 5000, and most of them are used to do *, shatter and transfer functions. The number of logic gates that can do security is very limited, no. There can be very complicated calculations on the current RFID tags. The Z RFID tags are regarded as "SmartTag," and it is difficult to operate on the current actual situation. Therefore, the present invention proposes to propose a kind of conformity (4). The property transfer agreement of c 1 ass 1 enables the following methods to achieve the following objectives through the anti-counterfeiting mechanism of the interactive verification method: 1 • It can be used for low-cost, limited computing capabilities of 丨D tags. Without complicated operations, the access speed can be very fast. It can ensure the integrity of the RFID tag data. 4. It can prevent the RFID tag from being copied in large quantities. ° /, the concept of ownership, so that the goods can be transferred to him. 6. Prevent illegal tag access 7. Prevent fraudulent tag attacks on the code reader, 8. Prevent man-in-the-middle attacks 9. Prevent user-friendly privacy tracking attacks 1〇. Prevent user location privacy tracking attacks. To the standard iron and Jing Shimin mouth weaving code between the two to identify fi.. 1 2. Comply with gpp Γ ass 1 Generation 2 standard. 15 200941993 1 3. Reduce the burden of database reading. Similar products are proposed The use of digital vouchers and the construction of a secure focus of the present invention is to study a suitable solution, the technology of RF ID, through a technology trading platform for product property rights transfer, without seeing the imitation. [Embodiment] Please refer to FIG. 3, the method proposed by the present invention is divided into four stages: 1 · registration stage; 2. interactive authentication stage; 3 · property rights transfer request stage; 4. update server property rights transfer stage. The invention will address this architectural flow for these four phases. First, according to the requirements, the present invention first introduces some symbols that will be used in the proposed method: % is a temporary block; & is a key If the tag is registered with the database, they will get (^). ❿ ® : Mutual exclusion or gate operation m〇: Random random number generated by the reader. (4) Voucher, when the user purchases the object, they have the certificate.

Cer/A.。 IDX ' 尤的身分識別碼。 R'' 第7個讀碼器身份代碼。 A : 舊的標籤擁有者。 16 200941993 Ο ❹ Β : 新的標鐵擁有者。 Msg,.eg .. 故冊訊息。 Sigx : 尤的簽章值。 厂V⑽: 使用K AA、 的公餘去驗證訊息W。 Ex{m): 使用 JT ήίι /\ 勺Α輪,對訊息w做加密。 Dx{m): 用尤的公錄,對訊息W做解密。 Sx(m): 使用尤的私鑰對訊息m做簽章。 CRC(X)- 豐于 作痛'環·多餘檢查(Cyclic Redundancy Check) 運算。 EPCX : 尤標籤的電子產品碼。 (1)註冊階段 的卩自&刀成兩個部分,分別是標籤和資料庫註 冊以及讀碼器和資料庫咕 冊4份的資訊流程。以下說明註 冊階段的流程,以及初值夂 初值參數的建立,並請一併參閱圖四 及圖五: 步驟 1:每一個標籤4丨都具有—個唯一的卯。值, 當某個標籤41向資料庫4 2 ^ π * ^达冊時’它們會約定好很多 的Μ值和金输尺;.,以便之德姑此 的應用。例如,i號標籤41向 資料庫42註冊時,告知資 一 、升庫42匕的EPCn值,資料庫 4 2就會傳回對應的w,值和 ▲鑰尺,。其中,一個7V,值將只會 對應到~個唯一的金鑰欠, f兮―個讀螞器5 1也具備多組Μ 17 200941993 值和金鑰尺,’所以在標簸41向資料庫4 _ 註冊的同時,也 代表了這個#籤41將只能被某些讀。 0 . ^ 為51所讀取。 步驟Z ·母一個讀碼器51具有—個唯 讀碼器51必須向資料庫42註冊後才At Λ 勺IDRl值 .取本宜個nn 後才此對標藏41進行存 取。虽某個項碼态51向貧料庫42註挪吐 聊日寻,它們會約定可 讀取標籤41的Λ^.值和金鑰尺。例如, ^ . 唬續碼器51向資料 庫4 2註冊時’告知資料庫4 2它的I j·)技 iLlRl值,資料庫42就 會傳回對應的以,值和金鑰。因此,誃钱 ® “貝馬态51只能讀 取具備相同 '值和金鑰火,的標籤41, , 所从在讀碼器51向 資料庫4 2註冊的同時,也限定了該 t貝碼益51的權限(例 如可讀取的標籤41 )。 (2 )交互認證階段 在標簸4丨和讀碼器51進行通訊之前,必須去執行交 互認證步驟,使得標籤41和讀碼器51都可判斷彼此是否 〇 為合法的設備。本發明僅使用符合£PCglobal class i Generat i on 2標準的隨機數產生器、互斥或閘運算和crc 功能,達成標籤和讀碼器的交互認證功能。請參考圖六, 以下為本發明所提出在交互認證階段的流程: 6-1 ·當讀碼器要對標籤進行存取時,讀碼器將會計算 CRCiNieRND) 〇 6-2.达出一個要求訊息从叫、㊉抓叫及似①給標 18 200941993Cer/A. IDX's special identity. R'' 7th reader code. A: Old label owner. 16 200941993 Ο ❹ Β : The new owner of the standard. Msg,.eg .. book information. Sigx: Especially the signature value. Factory V (10): Use K AA, the public money to verify the message W. Ex{m): Encrypt the message w using the JT ήίι /\ scoop wheel. Dx{m): Decode the message W with a special record. Sx(m): Sign the message m with a special private key. CRC(X)- is a painful 'Cyclic Redundancy Check' operation. EPCX: The electronic product code of the U.S. label. (1) The registration phase is divided into two parts: the label and database registration, and the information flow of the reader and the database. The following describes the process of the registration phase, as well as the establishment of the initial value and initial value parameters, and please refer to Figure 4 and Figure 5 together: Step 1: Each tag has a unique 卯. Value, when a tag 41 reaches the database 4 2 ^ π * ^ booklet, they will agree on a lot of depreciation and gold ruler;., so that the application of this. For example, when the i-tag 41 is registered with the database 42, the EPCn value of the capital and the bank 42 is notified, and the database 4 2 returns the corresponding w, value and ▲ key. Among them, a 7V, the value will only correspond to ~ a unique key owed, f 兮 - a reading machine 5 1 also has multiple groups Μ 17 200941993 value and key ruler, 'so in the standard 41 to the database 4 _ At the same time of registration, it also represents this #sign 41 will only be read by some. 0 . ^ Read for 51. Step Z: The parent one of the code readers 51 has a code reader 51 that must register with the database 42 before the value of the IDR1 of the At Λ spoon. It is preferable to register the tag 41 after taking the nn. Although a certain item state 51 is sent to the poor library 42, they will agree to read the value of the label 41 and the key. For example, when the codec 51 registers with the database 4 2, it informs the database 4 2 its I j ·) iLlRl value, and the database 42 returns the corresponding value, key and key. Therefore, the Money®® “Bei Ma State 51 can only read the tag 41 with the same 'value and key fire', and from the code reader 51 to the database 42, it also defines the t-bike code. The authority of the benefit 51 (for example, the readable label 41). (2) The interactive authentication stage must perform the interactive authentication step before the label 4 丨 and the code reader 51 communicate, so that both the tag 41 and the code reader 51 It can be judged whether each other is a legitimate device. The present invention only uses the random number generator, mutual exclusion or gate operation and crc function in accordance with the £PCglobal class i Generat i on 2 standard to achieve the interactive authentication function of the tag and the reader. Please refer to Figure 6. The following is the flow of the interactive authentication phase proposed by the present invention: 6-1 · When the reader accesses the tag, the reader will calculate CRCINieRND) 〇 6-2. Request message from call, ten call and like 1 to mark 18 200941993

6-3.當標籤收到讀碼器傳來的這此訊自 一 '後,標籤就會 使用存在記憶體中的乂'去判斷 ? CRC[N’RND^CRCXN〖® RND)。 6-4.如果上式等式成立’標籤將產生 個新的亂數值 歷卿 並計算Y及Z參數值。 Ο 6-5.計算卜(心'㊉及5。 6-6.計算 z = a?c(观。 6-7·標籤將傳送(狀仏⑽’ r,z)給讀碼器。 6-8. —旦收到標籤的回覆訊息,讀碼器就使用 功能去計算和比較Z 9 Z = CRC(RND晒,®N,Y)。6-3. When the tag receives the message from the reader, it will be judged by the presence of 乂 in the memory. CRC[N’RND^CRCXN® RND). 6-4. If the above equation is true, the label will generate a new chaotic value and calculate the Y and Z parameter values. Ο 6-5. Calculation Bu (Heart '10 and 5. 6-6. Calculate z = a?c (view. 6-7· The label will transmit (like 仏(10)' r,z) to the reader. 6- 8. Once the tag reply message is received, the reader uses the function to calculate and compare Z 9 Z = CRC (RND, ® N, Y).

CRCCRC

9 _假設等式成立,讀瑪哭, 巧益砘使用從標籤得到的 沿仍卿及r去計算出的雷;姦口站 & w冤子產品編碼£pc^ EPCd®RNDnew®Y。 以上是本發明關於設計符合EpCgl〇bai class i GeneaUonS標準協定(標籤和讀碼器之間關鍵的傳輸僅 使用了咖、互斥或,算或是金輸加以保護),滿足了 標鐵及讀碼器間交互認證需求之初步藍圖。 在以上協定中探討了符合EpCgl〇bal nass i Generation 2標準之標籤和讀竭器之間的交互認證之 19 200941993 後,本發明有興趣進一 / ^索將RFID標籤嵌入產品包裝 内,用來驗證產品的 '真偽。在以讀碼器和標籤間交互認證 為基礎後,即進杆相^ . $ ^^之擁有者產權轉移協定。認為 運用非對稱式密碼加 雜凑函數的數位簽章機制,能確保 R F ID標籤内的資訊 為女王,並且在RFID標籤和讀取器9 _ Assume that the equation is established, read Ma Cry, Qiaoyi 砘 uses the traces obtained from the label along the still and r to calculate; rape mouth station & w 冤 product code £pc^ EPCd®RNDnew®Y. The above is the design of the invention conforms to the EpCgl〇bai class i GeneaUonS standard protocol (the key transmission between the tag and the reader is only protected by coffee, mutual exclusion or arithmetic or gold input), which satisfies the standard and read A preliminary blueprint for inter-coder cross-certification requirements. In the above agreement, the interaction certification between the label and the read-end device conforming to the EpCgl〇bal nass i Generation 2 standard was discussed. 19 200941993, the present invention is interested in further embedding the RFID tag into the product package for verification. The authenticity of the product. After the cross-certification between the reader and the tag, the owner's property transfer agreement is entered. It is believed that the digital signature mechanism using asymmetric cryptography plus hash functions ensures that the information in the R F ID tag is queen and is in the RFID tag and reader.

之間加上鑑別協定(A 、UThentlcatlon Protocol),達到有 效防止偽造的標藏及非法的讀取,若是使用者構買了某樣 產品,即可得到商家發給的新憑證’進一步達到產權轉移 的目標。 (3)產權轉移要求階段: 假設有使用者A欲將擁有標籤之產權轉移給使用者 β時,A即必須製作產權轉移要求訊息,ϋ將舊憑證及同 意交易簽章值傳送給B。 ❹ 四請參考圖七,其步驟為:當使用者Β要向使用者α 貝聋貝產品X時,使用去Α <百4πί立Γ7 h 者A /員把產σα的(此時細/存有伺 服器資料庫端記錄之產品擁有者Α之憑證%的雜凑通 數峰轉交給使用者B,同時製作產權轉移訊息,使 用者A先使用本身的私鑰對訊息做簽章: sga = S A{Cert x , id b) 使用者A再以β之公鑰對做加密,得到 20 200941993 (4)更新伺服器端之產權轉移階段: 新的標籤擁有者B將產品舊憑證連同自己及舊標籤 擁有者A之同意交易簽章值透過讀碼器傳送到後端伺服 ' 器,伺服器在驗證過簽章值及舊憑證之後重新核發新的憑 • 證給新的標籤擁有者B並將資料庫更新,讀碼器將新憑證 的赫序函數值重新寫入新的標籤。請參考圖八,以下為本 發明所提出在更改伺服器端之產權階段的流程說明如下: I 步驟8-1 :使用者B用本身的密鑰對五做解 密= 州尤))得到从。 步驟8-2 :使用者B再用A的公鑰去驗證从^正確性 VA (SGa ) ={Cert x, IDB ) 步驟 8-3 :使用者 Β使用本身的私鑰對訊息 做簽章.· SGb = SB(IDA,IDB,Msgreg) φ 步驟8-4 :然後使用者Β用伺服器S的公鑰去驗證憑 證CerrA,的正確性,及判斷所存之//(CerQ)是否正確。 步驟 8-5 :如果驗證正確,使用者B就把訊息 (//^,//^,(^/^,^^哪:犯仏抓^傳給伺月民器端之讀瑪器尺。 步驟 8 - 6 :讀碼器在交互認證階段讀到处Ci和 (IDA,IDB,Msgreg,SGB,SGA,Certxyi,背% {N^EPCx),{ K^Cerix), 即轉送(//½,乂 ® ,尺㊉哪,5^,见4)給伺服器端。 21 200941993 步驟8-7 :伺服器端收到訊息先以使用者B的公鑰去 驗證B的簽章 7 VB (SGB ) , IDb , Msgreg ) 步驟8 - 8 :如果正確的話’伺服器再以A的公擒驗證 - A的簽章 VA{SGA)l{EPCx,IDB), 步驟8-9 :假設驗證正確’伺服器就依仍沿到資料庫 @ 表格找出相應之W,A")並得到砂及憑證(:咐/ £PCA- = JV,_ ㊉ ㊉ JV,.' ’Add the authentication agreement (A, UThentlcatlon Protocol) to achieve effective prevention of counterfeit and illegal reading. If the user buys a certain product, the new certificate issued by the merchant can be obtained. The goal. (3) Stage of transfer of property rights: Assuming that user A wants to transfer the property rights of the tag to the user β, A must make a property transfer request message and transmit the old voucher and the agreed transaction signature value to B. ❹ 4 Please refer to Figure 7. The steps are as follows: When the user wants to use the user's α 聋 聋 产品 product X, use Α 百 百 百 百 百 Γ h h h h h h h / / / / ( ( ( ( ( ( ( ( ( ( ( ( The hash peak of the % of the product owner's certificate stored in the server database is transferred to User B, and a property transfer message is created. User A first signs the message using its own private key: sga = SA{Cert x , id b) User A encrypts the public key pair of β and obtains 20 200941993 (4) Updates the ownership transfer phase of the server: The new tag owner B will use the old voucher of the product together with himself and The old label owner A's consent transaction signature value is transmitted to the backend server through the barcode reader, and the server re-issues the new certificate to the new label owner B after verifying the signature value and the old certificate. The database is updated and the reader rewrites the value of the new order's epoch function to the new tag. Please refer to Figure 8. The following is a description of the process of changing the property rights of the server at the following stage: I Step 8-1: User B uses his own key to solve the problem of 5; Step 8-2: User B uses A's public key to verify the correctness of VA (SGa) = {Cert x, IDB.) Step 8-3: The user 签 uses his own private key to sign the message. · SGb = SB (IDA, IDB, Msgreg) φ Step 8-4: The user then uses the public key of the server S to verify the correctness of the credential CerrA, and determines whether the stored / / (CerQ) is correct. Step 8-5: If the verification is correct, User B will send the message (//^, //^, (^/^, ^^: 仏 仏 仏 ^ to the reader of the servant.) Step 8 - 6: The reader reads Ci and (IDA, IDB, Msgreg, SGB, SGA, Certxyi, back % {N^EPCx), { K^Cerix) in the interactive authentication phase, that is, transfer (//1⁄2,乂®, rule ten, 5^, see 4) to the server. 21 200941993 Step 8-7: The server receives the message and first verifies the signature of B with user B's public key. 7 VB (SGB) , IDb , Msgreg ) Step 8 - 8 : If correct, the server will be verified by A's public certificate - A's signature VA{SGA)l{EPCx, IDB), Step 8-9: Assume that the verification is correct 'Server Just follow the database @ table to find the corresponding W, A ") and get the sand and the voucher (: 咐 / £PCA- = JV, _ ten JV,.' '

Certx ^K^Certx®!^,, 步驟8 - 1 0 :伺服器以自己的公輪去驗證憑證的 正確性, 步驟8-1 1 :憑證CerQ驗證正確後’伺服器重新發出 新的憑證cwty,並且在資料庫更新τ^χ的新擁有者為B。 ❹ 步驟8 —1 2 :伺服器計算(CVQ,㊉AV·)及枞C州j)。 步驟8-13 :伺服器傳送給讀碼器。 步驟8 -1 4 .讀碼器收到訊息後,把γα,Ύ)寫入~ 。 步驟8 -1 5 ·並把(Ce々,醫广)轉送給β。 步驟8-16 :使用者B以儲存在記憶體中之矸計算 C咖x'=c奶,得到新的憑證Cm „,。 根據前述内容,本發明所提出的方決能達成以下幾項 22 200941993 目標: (1) 能杜絕非法標籤存取。 (2) 能杜絕假扮標籤攻擊讀碼器。 ' (3)能防止中間人攻擊。 (4 )此防止攻擊追蹤使用者嗜好隱私。 (5) 能防止攻擊追蹤使用者位置隱私。 (6) 榇籤及項碼器間達到交互認證。 ❹ )^ 出月匕符合 EPCg 1 oba 1 C1 ass 1 Generation 2 之 工業標準協定。 (8)完成產權轉移的協定内容。 (9 )可用於低成本、運算能力有限的rf丨D標籤。 (1 0 )減少資料庫存取負擔。 本發明所提供之RFID系統符合Epc第二代第一類的 權轉移方法,與其他習用技術相互比較時,更具備下列 ❿ 優點: 1.建構—個具有交互認證且符合EpCgl〇bal Class 1 Genera t! 〇n 2標準之產權轉移協定,大量降低標籤運算 成本,本法不僅解決目前標籤運算能力不足之缺點,而且 也提出—個符合 Epcgl〇bal Class 1 Generation 2 標準 產榷轉移的解決方案,在仿間尚無看到類似產品被提出。 2 ·本發明以RF ID技術為本,加上整合密碼學實作平 23 200941993 防偽、產權轉移技術分階段進行建置,希 丨二、'' 勺汗啦,協助提升國内R F ID與密碼學整合 術的發展。同時在這樣的產權轉移授權模式之下, 使者在購買了商品之後能夠在資訊安全技術的 付到安王的保障,這是本發明所提方法最大的特 上列係針對本發明之一可行實施例之具體說| 實施例並非用以限制本發明之專利範圍,凡未脫离. 技藝知神所為之等效實施或變更,均應包含於本案 範圍中。 圖式簡單說明】 圖—為EPC碼格式分析圖; 圖為E p c網路的運作流程圖; ®為&籤向資料庫註冊階段之流程圖; 圖^為讀碼器向資料庫註冊階段之流程圖 圖八為乂互認證階段之流程圖; ❹ 望藉由 防偽技 使得當 保護下 色。 月,惟該 本發明 之專利 圖:為產權轉移要求p皆段之流程圖;以及 :更新伺服器端之產權轉移階段之流 主要元件符號說明】 10電子產品碼範例 11辨識編碼格式 12辨識產品製造商 13辨識產品的型號 14辨識產品的唯一序號 24 200941993Certx ^K^Certx®!^,, Step 8 - 1 0 : The server verifies the correctness of the voucher with its own public bus, Step 8-1 1 : After the credential CerQ is verified correctly, the server reissues the new credential cwty And the new owner of the τ^χ update in the database is B. ❹ Step 8 — 1 2 : Server calculation (CVQ, ten AV·) and 枞C state j). Step 8-13: The server transmits to the reader. Step 8 -1 4. After the reader receives the message, write γα, Ύ) to ~. Step 8 -1 5 · And transfer (Ce々, 医广) to β. Step 8-16: User B calculates C coffee x'=c milk after storing it in the memory, and obtains a new certificate Cm „. According to the foregoing, the present invention can achieve the following items 22 200941993 Target: (1) Can prevent illegal tag access. (2) Can prevent fake tags from attacking the code reader. ' (3) It can prevent man-in-the-middle attacks. (4) This prevents attacks from tracking user preferences. (5) It can prevent the attack from tracking the privacy of the user's location. (6) The interactive authentication is achieved between the sign and the item code. ❹ )^ The monthly standard meets the industrial standard agreement of EPCg 1 oba 1 C1 ass 1 Generation 2. (8) Complete the transfer of property rights (9) It can be used for rf丨D tags with low cost and limited computing power. (1 0) Reduce the burden of data inventory. The RFID system provided by the present invention complies with the second-generation first-class weight transfer method of Epc. Compared with other conventional technologies, it has the following advantages: 1. Construction - a property transfer agreement with interactive certification and EpCgl〇bal Class 1 Genera t! 〇n 2 standard, which greatly reduces the cost of label computing. Not only solve current tags The shortcomings of insufficient computing power, and also proposed a solution that meets the Epcgl〇bal Class 1 Generation 2 standard production transfer, and no similar products have been proposed in the imitation room. 2 · The invention is based on RF ID technology. In addition, the integrated cryptography implementation of Ping 23 200941993 anti-counterfeiting, property rights transfer technology in stages, the implementation of the second, ''spoon sweat, help to improve the development of domestic RF ID and cryptography integration. At the same time in this property rights Under the transfer authorization mode, the messenger can secure the security of the information security technology after the purchase of the goods, which is the largest special method of the method of the present invention. The embodiments are not intended to limit the scope of the invention, and the equivalent implementations or modifications of the art are intended to be included in the scope of the present disclosure. Brief description of the drawings] Figure - EPC code format analysis chart; The picture shows the operation flow chart of the E pc network; ® is the flow chart of the registration stage of the & sign-in database; Figure 2 is the flow chart of the registration stage of the code reader to the database. The flow chart of the segment; ❹ hope to protect the under-color by means of anti-counterfeiting technology. Month, the patent map of the invention: a flow chart for the transfer of property rights requirements; and: updating the flow of property rights at the server end Main component symbol description] 10 electronic product code example 11 identification coding format 12 identification product manufacturer 13 identification product identification type 14 identification product unique serial number 24 200941993

20商品 21製造商 211 0NS 22物流供應鏈 23通路門市 231 0NS 24消費者 241 ONS 25 Root 0NS 41標籤 42資料庫 51讀碼器20 products 21 manufacturers 211 0NS 22 logistics supply chain 23 channel stores 231 0NS 24 consumers 241 ONS 25 Root 0NS 41 tags 42 database 51 code reader

2525

Claims (1)

200941993 '申清專利範園 1. Ο200941993 'Shenqing Patent Fanyuan 1. Ο 種朴I Π $ 糸統符合EPC第二代第一類的產權轉移方 法’包括古 … 仰有四個階段,其特徵在於: 第—階於 又’註冊階段: 將~ RFlD萨从 《 & ‘織向資料庫註冊,使其僅能為特定讀碼 器吕汽,、 ± 以及將一對應之讀碼器向資料庫註冊,使該 讀碼3§ β + 卜 D Ύ讀取該特定標籤; 第二階段,上 父互認證階段: 在標籤和讀。。,_ D馬盗進行通訊之前,必須去執行交互認證 步驟,复总 , ,、使用符合 EPCglobal Class 1 Generation 2標準的卩左Λ 艰機數產生器、互斥或閘運算和CRC功能, 使得標翁4 _ 犯 和頃碼器都可判斷彼此是否為合法的設 備》逵士 ^ ^籤和讀碼器的交互認證功能; 弟三階與· _ 又’產權轉移要求階段: 當使用去 A欲將擁有標籤之產權轉移給使用者B時, A即必須制I ^ "、表作產權轉移要求訊息,並將舊憑證及同意 又易簽章值傳送給β; 第四階JR $ 又’更新伺服器端之產權轉移階段·· 新的標籤擁有者B將產品舊憑證連同自己及舊標籤 擁有者A之同意交易簽章值透過讀碼器傳送到後端 伺服器,伺服器在驗證過簽章值及舊憑證之後重新核 考X新的憑證給新的標籤擁有者B並將資料庫更新,讀 26 200941993 2· 3· 碼器將新憑證的赫序函數值重新寫 ,, 新的標籤。 如申請專利範圍第1項听述RF “ (RFID糸统符合EPC第二 代第一類的產權轉移方法,1中 八干在1主冊階段,每一個 :織都具有—個唯—的電子產品碼,h㈣向資料 在冊時,該資料庫就會傳回對應的智時字組和金 輸’且該暫時字組僅對應到一個 的金鑰,使該標 戴只能被某些特定的讀碼器所讀取。 如申請專利範圍第2項所述RFID系统符a Epc第二 代第-類的產權轉移方法,…註冊階:,每一: f碼器都具有—個♦—的讀碼器身份代碍,當該讀碼 ,向資料庫註冊時,該資料庫就會傳回對應的暫時字 組和金鑰,使該讀碼器只能讀取具備相同暫時字組和 金鑰的標籤。朴朴 I Π 糸 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合 符合'Original registration of the database, so that it can only register the specific code reader Lu, , ± and a corresponding reader to the database, so that the reading 3 § β + 卜 D Ύ read the specific label The second stage, the parental mutual authentication phase: in the label and read. . Before the communication, the _D thief must perform the interactive authentication step, the total, and the use of the EPCglobal Class 1 Generation 2 standard, the 卩 Λ 机 数 产生 generator, mutexes or gate operations and CRC function, so that the standard Weng 4 _ guilty and the coder can judge whether each other is a legitimate device. The interactive authentication function of the gentleman ^ ^ sign and the code reader; the third order of the brother and the _ and the stage of the transfer of property rights: when using When transferring the property rights of the label to the user B, A must make the I ^ " table for the property transfer request message, and transfer the old certificate and the agreed and easy sign value to β; the fourth order JR $ and ' Update the server-side property transfer phase·· The new tag owner B passes the product voucher along with the signature of the owner and the old tag owner A's consent transaction to the back-end server through the reader. The server has verified After signing the value and the old voucher, re-examine the X new voucher to the new tag owner B and update the database. Read 26 200941993 2· 3· The coder rewrites the value of the new voucher function, new label. For example, the RFR of the first part of the patent application scope ("RFID system conforms to the second-generation first-class property rights transfer method of EPC, 1 in the eight mains in the main volume stage, each one: weaving has a unique electronic" Product code, h (4) When the data is in the book, the database will return the corresponding wise time group and gold input 'and the temporary word group only corresponds to one key, so that the standard can only be specified by certain Read by the code reader. As described in the second paragraph of the patent application scope, the RFID system symbol A Epc second-generation first-class property rights transfer method, ... registration order:, each: f code has a - ♦ - The reader's identity is obstructed. When the code is registered with the database, the database will return the corresponding temporary block and key, so that the reader can only read the same temporary block and The key of the key. 4'如申請專利範圍第1項所述RF ID系統符合EPC第二 代第一類的產權轉移方法,其中在註冊階段,當該讀 碼為像資料庠註冊時,即限定了該讀碼器的讀取權 限。 27 1 _如申請專利範圍第1項所述RFID系統符合EPC第二 代第一類的產權轉移方法,其中在交互認證階段,更 進一步包括: 步’驟1 ·當讀碼器要對標籤進行存取時’讀碼器將會 200941993 6. 送出個要求訊息給標籤; 步驟2 .當標籤收到讀瑪器傳來的這些訊息後,標籤 ’y尤曰使用存在記憶體中的資料去判斷訊息的正確 性’若資K該標籤將產生一個新的亂數值與參 數傳回讀碼器; /騍3旦收到標籤的回覆訊息,讀碼器就使用CRC 力去十算並回覆訊息,若資料正確,則算出該標籤 的產品識別碼。 申月專利範圍第1項所述RF1D系統符合EPC第二 代第—類的產權轉移方法,其中在產權轉移要求階 段’當使用者B要向使用者A購買產品χ時,使用者 Α須把產品的標籤轉交給使用者β,@時製作產權轉 移訊息,使用者Α先使用本身的私鑰對訊息做簽章, 再以B之公錄對訊息做加密,再將此訊息傳給使用者 ❹ 7. B ° 如申請專利範圍第6項所述RFID系統符合Epc第二 代第一類的產權轉移方法,其中該標籤存有伺服器資 料庫端記錄之產品擁有者A之憑證的雜凑函數值。 8. 如申请專利範圍第1項所述RF ID系統符合第一 代第一類的產權轉移方法’其中產權轉移要求階段進 入更新伺服器端之產權轉移階段,使用者A之身份即 28 200941993 成為舊標籤擁有者A,而使用者B之身份即成為新標 籤擁有者B。 9·如申請專利範圍第1項所述RFID系統符合EPC第二 代第一類的產權轉移方法,其中在更新伺服器端之產 杻轉移階段,更包括以下步驟: / μ 1 .使用者B用本身的密鑰對轉移訊息做解密 德 ) ❹ ❹ ’使用者β再用Α的公鑰去驗證正確性,然後使用 B使用本身的私鑰對訊息做簽章,再用伺服器S 的a靖去驗證憑證的正確性,如果驗證正確,使用者 β就把訊息傳給伺服器端之讀碼器; 步驟2 :讀碼器在交互認證階段讀到訊息後,經計算 亚將結果轉送給伺服器端; 二驟3 _伺服器端收到訊息先以使用纟Β的公鑰去驗 -β的簽章’如果正確的話,伺服器再以α的公錄驗 7Α的簽章,假設驗證正確,飼服器就依到資料庫表 格找出相應之數值並計算後 馮上 井俊冉以自己的公鑰去驗證 心澄的正確性,該伺服器 啊心出新的憑證,然後計 亚且在資料庫更新的新 擁有者為B,而後伺服器傳 V更新後的訊息及給讀碼器; 步知4 :讀碼器收到訊息後 把訊息轉送給B ; 把訊息寫入標籤值 並 29 200941993 步驟5:使用者B以儲存在記憶體中之暫時字組計算 訊息,得到新的憑證。4' The RF ID system described in item 1 of the patent application scope complies with the EPC second-generation first-class property rights transfer method. In the registration phase, when the reading code is registered as data, the code reader is defined. Read permission. 27 1 _ As stated in the scope of patent application, the RFID system complies with the EPC second-generation first-class property transfer method, in which the interactive authentication phase further includes: Step 1 • When the reader wants to carry out the label When accessing, the 'code reader will be 200941993 6. Send a request message to the label; Step 2. When the label receives the message from the reader, the label 'y is used to judge the data in the memory. The correctness of the message 'If the label K will generate a new random value and parameters are sent back to the reader; /骒3, after receiving the reply message of the label, the reader will use the CRC force to count and reply to the message. If the information is correct, calculate the product identification number of the label. The RF1D system described in item 1 of the patent scope of Shenyue complies with the EPC second-generation type of property transfer method, in which the user does not need to purchase the product when the user B wants to purchase the product from the user A. The product label is handed over to the user β, @ when making the property transfer message, the user first signs the message with its own private key, then encrypts the message with the B record, and then transmits the message to the user. ❹ 7. B ° The RFID system described in item 6 of the scope of patent application complies with the Epc second-generation first-class property transfer method, in which the tag contains the hash of the certificate of the product owner A recorded on the server database side. Function value. 8. If the RF ID system described in item 1 of the patent application meets the first-generation first-class property rights transfer method, in which the property transfer request phase enters the stage of property rights transfer at the update server, the identity of user A becomes 28 200941993. The old tag owner A, and the identity of user B becomes the new tag owner B. 9. The RFID system described in item 1 of the patent application scope complies with the EPC second generation first class property rights transfer method, wherein the update step at the server end includes the following steps: / μ 1 . User B Decrypt the transfer message with its own key.) ❹ ❹ 'User β uses the public key of the user to verify the correctness, and then uses B to sign the message with its own private key, and then use the server S's a. Jing to verify the correctness of the voucher, if the verification is correct, the user β will send the message to the reader of the server; Step 2: After reading the message in the interactive authentication phase, the reader will transfer the result to the sub-calculation Server side; 2 step 3 _ server receives the message first to use the public key of 纟Β to check the signature of 'β'. If it is correct, the server then checks the signature of the Α7 ,, assuming verification Correctly, the feeding device will find the corresponding value according to the database table and calculate it. Feng Shangjing Junyi uses his public key to verify the correctness of Xincheng. The server has a new certificate and then counts the Yahoo. The new owner of the database update is B Then, the server transmits the updated message to the reader; Step 4: The reader sends the message to B after receiving the message; writes the message to the tag value and 29 200941993 Step 5: User B saves The temporary block in the memory calculates the message and gets a new voucher. 3030
TW097111634A 2008-03-31 2008-03-31 A rfid systems conformation to epc class 1 generation 2 standards ownership transfer scheme TWI350093B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW097111634A TWI350093B (en) 2008-03-31 2008-03-31 A rfid systems conformation to epc class 1 generation 2 standards ownership transfer scheme

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW097111634A TWI350093B (en) 2008-03-31 2008-03-31 A rfid systems conformation to epc class 1 generation 2 standards ownership transfer scheme

Publications (2)

Publication Number Publication Date
TW200941993A true TW200941993A (en) 2009-10-01
TWI350093B TWI350093B (en) 2011-10-01

Family

ID=44868469

Family Applications (1)

Application Number Title Priority Date Filing Date
TW097111634A TWI350093B (en) 2008-03-31 2008-03-31 A rfid systems conformation to epc class 1 generation 2 standards ownership transfer scheme

Country Status (1)

Country Link
TW (1) TWI350093B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043973A (en) * 2010-12-13 2011-05-04 北京交通大学 RFID ownership transfer method based on partially trusted centre

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043973A (en) * 2010-12-13 2011-05-04 北京交通大学 RFID ownership transfer method based on partially trusted centre
CN102043973B (en) * 2010-12-13 2012-10-31 北京交通大学 RFID ownership transfer method based on partially trusted centre

Also Published As

Publication number Publication date
TWI350093B (en) 2011-10-01

Similar Documents

Publication Publication Date Title
Zhang et al. Blockchain-based systems and applications: a survey
Jangirala et al. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment
Toyoda et al. A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain
US9256881B2 (en) Authenticating and managing item ownership and authenticity
CN108764877B (en) Digital asset right-confirming trading method based on block chain technology
EP3837617B1 (en) Distributed storage of custom clearance data
EP3844655B1 (en) Managing user authorizations for blockchain-based custom clearance services
US20140014714A1 (en) Product authentication and registration
EP3841491B1 (en) Blockchain-based smart contract pools
TW202009809A (en) User identity content information authentication and verification methods and devices
EP3841507B1 (en) User management of blockchain-based custom clearance service platform
US11372695B2 (en) Blockchain-based import custom clearance data processing
JP2016512675A (en) Secure trading system and method
KR20210158271A (en) System to provide genuinity verification and ownership change records of product esset by using a blockchain and a genuine authentiation tag technologies
EP3844654B1 (en) Blockchain-based document registration for custom clearance
Singhal et al. Anti-counterfeit product system using blockchain technology
TW388021B (en) Electronic payment gateway system of security transaction and independent authority
KR100875920B1 (en) Product authentication and service provider verification system using RDF signature tag and method
TW200941993A (en) A RFID systems conformation to EPC class 1 generation 2 standards ownership transfer scheme
KR102346085B1 (en) Method for Trading Ownership of Products
Balaji BlockChain based Secure Smart Property Registration Management System and Smart Property Cards
US20240211847A1 (en) Product Rights Management Systems and Methods Using Secure Tags and Cryptographic Tokens
KR102320103B1 (en) Method for Authenticating Genuineness by Substituting the Autograph of the Work
Chen et al. A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System. Symmetry 2022, 14, 1827
Ferrara et al. Digital Twin Through Physical Assets Tokenization in Blockchain

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees