WO2010009664A1 - 一种适合电子标签的数据安全存取方法 - Google Patents
一种适合电子标签的数据安全存取方法 Download PDFInfo
- Publication number
- WO2010009664A1 WO2010009664A1 PCT/CN2009/072826 CN2009072826W WO2010009664A1 WO 2010009664 A1 WO2010009664 A1 WO 2010009664A1 CN 2009072826 W CN2009072826 W CN 2009072826W WO 2010009664 A1 WO2010009664 A1 WO 2010009664A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- reader
- field
- writer
- key
- value
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- the invention relates to a data security access method suitable for electronic tags.
- Radio Frequency Identification (RFID) tags also face security issues.
- RFID Radio Frequency Identification
- the issue of identity authentication between readers and electronic tags in RFID must also be effectively addressed. If the performance of the electronic tag is high and has certain computing and processing capabilities, then we can use or refer to the secure access protocol of the existing wireless network to achieve authentication and authority identification between the electronic tag and the reader. However, if the electronic tag only provides the function of storing data and does not have any data processing capability by itself, the traditional security protocol is difficult to ensure the security of the stored data.
- electronic tags can be divided into three types: 1) Advanced electronic tags, with readable and writable functions, and with certain memory space and computing power; 2) Mid-range electronic tags Compared with the advanced label, the performance is slightly worse, the function is similar; 3) The low-grade electronic label is only used to record some data information, and the information can be read or written by the reader. Generally, there is no data processing. Functional and computing power, such tags such as recharge card.
- wireless network security solutions such as: wireless LAN IEEE802.11i, wireless metropolitan area network IEEE802.16e, WLAN China National Standard WAPI and other security solutions, have basic performance requirements for computing, data processing, etc. More or less can be used for the first two types of electronic labels, and for the third type of label is simply not applicable.
- the present invention provides a data security access method suitable for low performance electronic tags in order to solve the technical problem that the information existing in the low performance electronic tag cannot be safely written and safely read.
- the present invention is a data security access method suitable for low performance electronic tags, which is special in that: the method comprises the following steps:
- the first reader/writer When the data writing process is performed, the first reader/writer encrypts the message MSG and writes the electronic tag; when performing the data reading process, the second reader/writer transmits a data request packet to the electronic tag, and the data request packet is used for Transmitting the electronic tag to send a data response packet to the second reader/writer; the electronic tag sends a data response packet to the second reader/writer, wherein the data response packet includes a field, a field, and a PKey1D a field, a CP field, a CMSG field, and an MIC field, where the field is an identity of a first reader/writer that writes data information, the ⁇ field is an identity of a trusted third party, and the PKey1D field is a first read
- the CP field is the CP value calculated by the first reader and written into the electronic tag, and the CP value is equal to ⁇ ⁇ ⁇
- r is the first read a secret random number selected by the writer, the corps
- the second reader/writer sends a key request packet to a trusted third party, where the key request packet includes an ID 2 field, a TTP field, a Nonce field, a field, a PKey1D field, a CP field, a CMSG field, and a MIC field. And an MI field, where the ID 2 field is an identity of a second reader/writer that reads data information, the Nonce field is a one-time random number selected by the second reader, and the MI field is a second read/write
- the trusted third party performs identity validity verification on the second reader and the first reader according to the key request packet, and sends a key response packet to the second reader after the verification is passed.
- the key response packet includes an ID 2 field, a TTP field, a CSkey1D field, a CPi field, a Nonce field, and a MIC 2 field, where the ? 1 field is calculated by the trusted third party and sent to the second.
- the CP value of the reader/writer the CP value is equal to a secret random number selected by the trusted third party; the second reader/writer obtains the plaintext of the electronic label message MSG according to the key response packet.
- the first reader/writer encrypts the MSG and writes the electronic tag, and the first reader/writer randomly selects a key identifier PKey1D, and uses the PKey1D as a public key;
- the trusted third party performs identity validity verification on the second reader and the first reader respectively according to the key request packet, including: verifying the identity validity of the second reader/writer If the identity of the second reader/writer is invalid, the protocol ends, and if the identity of the second reader/writer is valid, the private key of the second reader/writer is calculated, and at the same time, the MI value is recalculated, and The recalculated MI value is compared with the received MI value.
- the protocol ends. If they are equal, the identity of the first reader is verified, if the identity of the first reader is invalid. End of the agreement, if the identity of the first reader is valid, calculate the private key of the first reader, and at the same time, recalculate the MIC value, and compare the recalculated MIC value with the received MIC value. If not equal, the protocol ends, otherwise, the key response packet is sent to the second reader.
- the identity authentication function is added to avoid the disadvantages of identity-based public key mechanism that is difficult to verify identity validity.
- Figure 1 is a flow chart showing an embodiment of a method for data security reading of an electronic tag in accordance with the present invention.
- TTP trusted third party
- the trusted third party is responsible for physical identification of user entity identity, system parameter generation, and User parameter establishment process.
- System parameters are first established by a trusted third party.
- the system parameters include: two-order cyclic group ((3 ⁇ 4,+) and ((3 ⁇ 4, ⁇ ); corpse generators; let e be; trusted
- the three parties randomly select their own private key T1T e E K (m) indicates that the message is encrypted using a symmetric encryption algorithm, and the encryption key is 1 ⁇ 4x) to represent a one-way hash function;
- This step is only to establish the system parameters when the first application is applied. After the establishment, the step is not needed in the subsequent repeated application;
- the first reader randomly selects a key identifier PKeylD and identifies the key as a public key.
- ⁇ : Encrypt MSG to get the corresponding ciphertext CMSG
- CP r ⁇ ⁇ and message integrity check value MIC ⁇ IDJI ⁇ IITTPIIPKeylDIICMSGIICP)
- the ID ⁇ TTP, CP, PKeyID, CMSG and MIC are written into the electronic tag; thus, the process of writing the electronic tag to the first reader ID fc information MSG is completed; 3) the data reading process:
- Two sub-processes are included: data acquisition and key acquisition process.
- the data acquisition includes two groups of data request and data response;
- the key acquisition includes two groups of a key request and a key response. Described separately as follows:
- the second reader/writer sends a data request packet to the electronic tag; the content of the packet is empty; 3.2) the electronic tag sends a data response packet to the second reader according to the data request packet; wherein the data response packet content includes:
- the first reader/writer ID ⁇ identity of the data information
- TTP field the identity of a trusted third party
- PKeylD field a PKeylD value selected for the first reader IDi and written to the electronic tag
- CP field The CP value calculated for the first reader IDi and written to the electronic tag, the value of which is equal to r - P ;
- CMSG field ciphertext of the MSG written to the first reader/writer
- MIC field The MIC value calculated for the first reader and written to the electronic tag, the value of which is equal to /i IDJI IIPKeyIDIICMSGIICP).
- the second reader sends a key request packet to the trusted third party
- the content of the key request packet includes:
- ID2 field the identity of the second reader ID 2 that reads the data information
- TTP field the identity of a trusted third party
- Nonce field a one-time random number selected by the second reader ID 2 ;
- IDi field the first reader ID of the data information is written;
- PKeylD field PKeylD value selected for the first reader IDi and written to the electronic tag
- CP field CP value calculated for the first reader and written to the electronic tag
- CMSG field ciphertext of the MSG written to the first reader/writer
- MIC field the MIC value calculated for the first reader and written to the electronic tag
- MI field The message integrity check value calculated for the second reader ID 2 , and its value is calculated as 1 ⁇ 4ID 2 IL3 ⁇ 4IITTPIINoncellMIC);
- the identity of the second reader can be verified. If the identity is invalid, the protocol ends. Otherwise, the second reader is calculated.
- the private key & at the same time, recalculate the MI value and compare it with the received MI value. If ⁇ 11 (the value is not equal, the protocol ends, otherwise, the identity of the first reader is verified, if The identity of a reader is invalid, the protocol ends, otherwise, the private key of the first reader is calculated, and the MIC value is recalculated and compared with the received MIC value. If the MIC values are not equal, the protocol ends, no Shell 1 h constructs a key response packet and sends it to the second reader/writer;
- the trusted third party sends a key response packet to the second reader according to the key request packet; wherein the key response packet content includes:
- ID 2 field the identity of the second reader ID 2 that reads the data information
- TTP field the identity of a trusted third party
- MIC 2 field Use the derived integrity check key IK to determine the integrity check value for all fields before the field;
- the safe writing function of the electronic tag by the reader can be realized by using step 2); the safe reading function of the electronic tag by the reader can be completed by using step 3).
- the identity validity and authority verification function of the reader is realized.
- step 2) If the second reader/writer acquires the plaintext information in the electronic tag data information and performs related processing, and needs to re-write the processed data information into the electronic tag, step 2) can be implemented.
- ID. identity information of the electronic tag
- ID 1 identity information of the first reader
- ID 2 identity information of the second reader
- Nonce one-time random number
- PKeylD key identifier, used as a public key
- SKeylD the private key corresponding to PKeylD
- MSG Information written to the electronic tag.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/055,296 US8332628B2 (en) | 2008-07-23 | 2009-07-20 | Method for accessing data safely suitable for electronic tag |
JP2011519016A JP5544627B2 (ja) | 2008-07-23 | 2009-07-20 | 電子タグに適するデータセキュリティアクセス方法 |
EP09799979A EP2309673A1 (en) | 2008-07-23 | 2009-07-20 | Method for accessing data safely suitable for electronic tag |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810150433.X | 2008-07-23 | ||
CN200810150433XA CN101350060B (zh) | 2008-07-23 | 2008-07-23 | 一种适合电子标签的数据安全存取方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010009664A1 true WO2010009664A1 (zh) | 2010-01-28 |
Family
ID=40268847
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/072826 WO2010009664A1 (zh) | 2008-07-23 | 2009-07-20 | 一种适合电子标签的数据安全存取方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8332628B2 (zh) |
EP (1) | EP2309673A1 (zh) |
JP (1) | JP5544627B2 (zh) |
CN (1) | CN101350060B (zh) |
WO (1) | WO2010009664A1 (zh) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101350060B (zh) * | 2008-07-23 | 2011-06-01 | 西安西电捷通无线网络通信股份有限公司 | 一种适合电子标签的数据安全存取方法 |
CN102063601B (zh) * | 2009-11-12 | 2015-04-01 | 中兴通讯股份有限公司 | 射频识别系统、阅读器和射频识别方法 |
US20120008784A1 (en) * | 2010-07-08 | 2012-01-12 | Phillip Martin Hallam-Baker | Delegated Key Exchange System and Method of Operation |
CN102510334B (zh) * | 2011-11-08 | 2014-02-12 | 北京博大光通国际半导体技术有限公司 | 基于wsn无线传感网射频技术的动态防伪保密系统和方法 |
US10002512B2 (en) | 2014-01-30 | 2018-06-19 | Le-Jun Yin | System and method for object entry and egress control in a predefined area |
CN104506554B (zh) * | 2015-01-04 | 2017-11-24 | 西安电子科技大学 | 一种手机终端访问云存储服务器的安全方法 |
US10778435B1 (en) * | 2015-12-30 | 2020-09-15 | Jpmorgan Chase Bank, N.A. | Systems and methods for enhanced mobile device authentication |
CN107948057B (zh) * | 2017-12-15 | 2024-05-14 | 北京辰安科技股份有限公司 | 一种信息传输方法与系统 |
CN109635610B (zh) * | 2018-12-11 | 2021-08-24 | 北京智芯微电子科技有限公司 | Rfid标签数据的读写系统及方法 |
CN110598810A (zh) * | 2019-08-19 | 2019-12-20 | 成都理工大学 | 一种电子标签的数据写入及读取方法 |
CN111572676B (zh) * | 2020-04-19 | 2021-08-13 | 东风汽车股份有限公司 | 一种车用仪表配置参数标定方法 |
CN114520725B (zh) * | 2022-03-01 | 2024-01-26 | 北京华云安信息技术有限公司 | 基于距离约束协议的认证方法、装置、设备和存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101103365A (zh) * | 2005-01-12 | 2008-01-09 | 英国电讯有限公司 | 射频识别标签安全性系统 |
CN101170411A (zh) * | 2007-12-03 | 2008-04-30 | 西安西电捷通无线网络通信有限公司 | 一种轻型接入认证方法 |
CN101350060A (zh) * | 2008-07-23 | 2009-01-21 | 西安西电捷通无线网络通信有限公司 | 一种适合电子标签的数据安全存取方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5673316A (en) * | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
US6959089B1 (en) * | 2000-04-07 | 2005-10-25 | General Instrument Corporation | Method and apparatus for secure transmission of data |
AU2002332671A1 (en) * | 2001-08-13 | 2003-03-03 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
US7548152B2 (en) * | 2004-10-08 | 2009-06-16 | Entrust Limited | RFID transponder information security methods systems and devices |
FR2892876A1 (fr) * | 2005-11-02 | 2007-05-04 | Gemplus Sa | Procede de depot securise de donnees numeriques, procede associe de recuperation de donnees numeriques, dispositifs associes pour la mise en oeuvre des procedes, et systeme comprenant les dits dispositifs |
-
2008
- 2008-07-23 CN CN200810150433XA patent/CN101350060B/zh not_active Expired - Fee Related
-
2009
- 2009-07-20 WO PCT/CN2009/072826 patent/WO2010009664A1/zh active Application Filing
- 2009-07-20 EP EP09799979A patent/EP2309673A1/en not_active Withdrawn
- 2009-07-20 JP JP2011519016A patent/JP5544627B2/ja not_active Expired - Fee Related
- 2009-07-20 US US13/055,296 patent/US8332628B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101103365A (zh) * | 2005-01-12 | 2008-01-09 | 英国电讯有限公司 | 射频识别标签安全性系统 |
CN101170411A (zh) * | 2007-12-03 | 2008-04-30 | 西安西电捷通无线网络通信有限公司 | 一种轻型接入认证方法 |
CN101350060A (zh) * | 2008-07-23 | 2009-01-21 | 西安西电捷通无线网络通信有限公司 | 一种适合电子标签的数据安全存取方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101350060A (zh) | 2009-01-21 |
EP2309673A1 (en) | 2011-04-13 |
JP2011528876A (ja) | 2011-11-24 |
JP5544627B2 (ja) | 2014-07-09 |
US20110126000A1 (en) | 2011-05-26 |
CN101350060B (zh) | 2011-06-01 |
US8332628B2 (en) | 2012-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010009664A1 (zh) | 一种适合电子标签的数据安全存取方法 | |
EP2082525B1 (en) | Method and apparatus for mutual authentication | |
US8001584B2 (en) | Method for secure device discovery and introduction | |
US20030200433A1 (en) | Method and apparatus for providing peer authentication for an internet key exchange | |
US11044084B2 (en) | Method for unified network and service authentication based on ID-based cryptography | |
CN1929371B (zh) | 用户和外围设备协商共享密钥的方法 | |
WO2010078755A1 (zh) | 电子邮件的传送方法、系统及wapi终端 | |
RU2445740C1 (ru) | Система и способ упрощенной аутентификации доступа | |
CN101409619A (zh) | 闪存卡及虚拟专用网密钥交换的实现方法 | |
Prakash et al. | Authentication protocols and techniques: a survey | |
WO2020216047A1 (zh) | 一种认证信息处理方法、终端和网络设备 | |
Yang et al. | An improved security scheme in WMAN based on IEEE standard 802.16 | |
JP5354656B2 (ja) | 暗号通信システム、暗号通信方法、送信装置および受信装置 | |
CN114826620B (zh) | 一种安全的绑定智能门锁的方法、系统及智能门锁 | |
CN118102290B (zh) | 基于ntru公钥加密的抗量子攻击车地认证方法及系统 | |
WO2023042618A1 (ja) | 無線通信端末装置、認証及び鍵共有方法、プログラム、認証及び鍵共有システム | |
Zhang et al. | A new authentication and key management scheme of WLAN | |
CN117201000A (zh) | 基于临时密钥协商的海量数据安全通信方法、设备及介质 | |
CN118540056A (zh) | 基于密钥中心和口令的公钥认证和密钥协商方法和系统 | |
Xin et al. | A security architecture based on user authentication of Bluetooth | |
CN118802297A (zh) | 鉴权处理方法、装置及相关设备 | |
KR20100034461A (ko) | 통신 네트워크에서 인증 방법 및 시스템 | |
Kucharzewski et al. | Mobile identity management system in heterogeneous wireless networks | |
Shahnawaz et al. | A REVIEW ON VARIOUS AUTHENTICATION TECHNIQUES AND PROTOCOLS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09799979 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2011519016 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13055296 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009799979 Country of ref document: EP |