WO2011147183A1 - 一种rfid系统、读写器及数据传输方法 - Google Patents

一种rfid系统、读写器及数据传输方法 Download PDF

Info

Publication number
WO2011147183A1
WO2011147183A1 PCT/CN2010/080387 CN2010080387W WO2011147183A1 WO 2011147183 A1 WO2011147183 A1 WO 2011147183A1 CN 2010080387 W CN2010080387 W CN 2010080387W WO 2011147183 A1 WO2011147183 A1 WO 2011147183A1
Authority
WO
WIPO (PCT)
Prior art keywords
certificate
data
electronic tag
rfid reader
authentication request
Prior art date
Application number
PCT/CN2010/080387
Other languages
English (en)
French (fr)
Inventor
武文
魏静波
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011147183A1 publication Critical patent/WO2011147183A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the invention relates to the field of radio frequency identification, in particular to an RFID system, a reader/writer and a data transmission method in an RFID system. Background technique
  • Radio Frequency Identification uses radio frequency signals to read the electronic tag (Tag) information in the user terminal through the RFID reader and decode it, and then sends it to the central information system to identify and manage the relevant data. Its non-contact automatic identification, no need for manual intervention, and the ability to identify multiple tags at the same time make the technology widely used in the fields of logistics, attendance, e-commerce, etc., and the scale is huge.
  • WLAN Wireless Local Area Network
  • WAPI Wired LAN Authentication and Privacy Infrastructure
  • WAPI Wired LAN Authentication and Privacy Infrastructure
  • the WAI is responsible for authentication and key management, and is authenticated by two-way authentication of three physical entities: STA, AP (Access Point, Wireless Access Point), and ASU (Authentication Service Unit). Where the authentication server ASU is the whole
  • STA Secure Digital
  • AP Access Point
  • ASU Authentication Service Unit
  • the core and foundation of WAI its main function is to realize the management of user certificate and the identification of user identity.
  • the WAPI user certificate is a public key certificate, and the identity of the network user can be uniquely determined by private key verification.
  • WAPI's certificate can be used to load information within the electronic tag.
  • WAPI needs to perform two-way authentication when transmitting data. After the authentication is passed, data transmission is performed, and there is a problem that the authentication efficiency is not high. There is still a certain bottleneck in the field of RFID, and it still cannot solve the problem of the RFID system based on the WLAN network. safe question. Summary of the invention
  • the invention provides a data transmission method for an RFID system, a reader/writer and an RFID system, which can solve the security problems faced by the existing WLAN network-based RFID system and improve the operation efficiency of the network.
  • the invention provides a radio frequency identification RFID system, comprising: a mobile radio frequency identification (RFID reader), a wireless access point (AP), an authentication server (ASU) and a central information system; wherein: mobile radio frequency identification (RFID) a reader/writer for reading electronic tag data and writing the read electronic tag data to a wireless local area network authentication and privacy infrastructure (WAPI) certificate when there is no data link between the mobile RFID reader and the AP And establishing a data link with the AP according to the Media Access Control (MAC) address of the legal AP stored in the WAPI certificate, and sending an authentication request frame to the AP through the data link, where the authentication request frame includes the WAPI certificate and the authentication The MAC address of the request frame, the WAPI certificate is issued by the ASU and pre-stored in the mobile RFID reader;
  • RFID mobile radio frequency identification
  • the AP is configured to receive the authentication request frame, and determine that the MAC address of the authentication request frame is in the MAC address list of the mobile RFID reader pre-stored in the AP, and send the authentication request frame to the ASU;
  • the ASU is configured to receive an authentication request frame sent by the AP, and verify the WAPI certificate in the authentication request frame, and determine that the WAPI certificate is legal, and extract the electronic tag data in the WAPI certificate and send the data.
  • the central information system is used to receive electronic tag data sent by the ASU.
  • the mobile RFID reader/writer is further configured to store the read electronic tag data when there is a data link between the mobile RFID reader and the AP.
  • the mobile RFID reader is further configured to perform key negotiation with the AP, and receive write data sent by the AP;
  • the AP is further configured to perform a key agreement with the mobile RFID reader to establish a secure data link when receiving the write data of the central information system, and send the write data sent by the central information system to the mobile RFID. Reader
  • the central information system is further configured to send write data to the AP when it is determined that the electronic tag data needs to be written.
  • the AP is further configured to: when receiving the query request of the central information system, determine that the mobile RFID reader stores the untransmitted electronic tag data, and establish a key agreement with the mobile RFID reader. Secure data link and receive the electronic tag data sent by the mobile RFID reader and send it to the central information system. After confirming the transmission of the electronic tag data in the mobile RFID reader, disconnect the mobile RFID. Data link between readers;
  • the central information system is further configured to send a query request to the AP when it is determined that the electronic tag data is not required to be written.
  • the AP is further configured to: when receiving the query request of the central information system, determine that the untransmitted electronic tag data is not stored in the mobile RFID reader, disconnect between the mobile RFID reader and the mobile RFID reader Data link.
  • the mobile RFID reader/writer includes: a flash memory, a front end tag reader/writer, a certificate generation module, and a terminal communication module; wherein:
  • the flash memory is configured to store a WAPI certificate issued by the ASU
  • the front-end tag reader/writer for reading electronic tag data
  • the certificate generating module is configured to write the read electronic tag data into the WAPI certificate when there is no data link between the terminal communication module and the AP;
  • the terminal communication module is configured to establish a data link with the AP according to a MAC address of a legal AP stored in the certificate, and send an authentication request frame to the AP by using a data link, where the authentication request frame includes The WAPI certificate and the MAC address of the authentication request frame.
  • the invention also provides a mobile RFID reader, comprising: a flash memory, a front-end tag reader, a certificate generation module and a terminal communication module; wherein:
  • the flash memory is configured to store a wireless local area network authentication and privacy infrastructure (WAPI) certificate issued by an authentication server (ASU);
  • WAPI wireless local area network authentication and privacy infrastructure
  • the certificate generating module is configured to write the read electronic tag data into the WAPI certificate when there is no data link between the terminal communication module and the wireless access point (AP);
  • the terminal communication module is configured to establish a data link with the AP according to a media access control MAC address of a legal AP stored in the certificate, and send an authentication request frame to the AP by using a data link, where the authentication request is sent
  • the frame contains the WAPI certificate and the MAC address of the authentication request frame.
  • the flash memory is further configured to store electronic tag data
  • the front-end tag reader/writer is further configured to store the read electronic tag data in the flash memory when a data link exists between the terminal communication module and the AP.
  • the present invention also provides a data transmission method for a radio frequency identification RFID system, comprising: a mobile radio frequency identification (RFID) reader/writer reads electronic tag data, and does not have a data link with a wireless access point (AP)
  • RFID radio frequency identification
  • AP wireless access point
  • the electronic tag data is written into the WLAN authentication and privacy infrastructure (WAPI) certificate, and the data link between the AP and the AP is established according to the media access control MAC address of the legal AP stored in the certificate, through the data link
  • the AP sends an authentication request frame, where the authentication request frame includes a certificate and a MAC address of the authentication request frame, WAPI
  • the certificate is issued by the authentication server ASU and pre-stored in the reader/writer;
  • the AP receives the authentication request frame, and determines that the MAC address of the authentication request frame is sent to the ASU in the MAC address list of the mobile RFID reader stored in advance by the AP;
  • the ASU receives the authentication request frame sent by the AP, and verifies the WAPI certificate in the authentication request frame, and determines that the WAPI certificate is legal, and extracts the electronic tag data in the WAPI certificate and sends the data to the central information system;
  • the central information system receives the electronic tag data sent by the ASU.
  • the method further includes: when the central information system determines that the electronic tag data needs to be written, sending the write data to the AP;
  • the AP When receiving the write data, the AP performs key agreement with the mobile RFID reader to establish a secure data link and sends the write data to the mobile RFID reader.
  • the embodiment of the present invention can use the WAPI access authentication mechanism in the RFID system to write the electronic tag data read by the reader into the WAPI certificate, and add the WAPI certificate to the authentication request frame. After being sent to the AP and verified by the address of the AP, it is sent to the ASU for certificate verification. After the ASU verification certificate is valid, the electronic tag data in the extracted certificate is sent to the central information system.
  • the WAPI access authentication mechanism is applied to the RFID system to ensure the security of the WLAN network-based RFID system, and the access of the WAPI network and the RFID data transmission are completed once, which greatly improves the operation of the network. effectiveness.
  • the AP needs to perform key agreement with the reader to establish a secure data link, and complete Subsequent data transmission between the central information system and the reader.
  • FIG. 1 is a structural diagram of an RFID system according to an embodiment of the present invention.
  • FIG. 2 is a structural diagram of a mobile RFID reader/writer according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of content and format of a WAPI certificate according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a data transmission method of an RFID system according to an embodiment of the present invention. detailed description
  • the present invention provides an RFID system capable of applying the WAPI authentication mechanism to the RFID system due to the security problem existing in the wireless network architecture-based RFID system.
  • the security of the RFID system of the wireless network and the ability to write the electronic tag data into the WAPI certificate, so that the access of the WAPI network and the electronic tag data transmission of the RFID system are completed once, which greatly improves the operating efficiency of the network.
  • An embodiment of the present invention provides an RFID system, as shown in FIG. 1, including:
  • the mobile RFID reader 11 is used for reading an electronic tag, and when the mobile RFID reader and the AP have not established a data link, the data of the electronic tag is written into a WAPI certificate (referred to as a certificate). And establishing a data link with the AP according to the MAC (Media Access Control) address of the legal AP stored in the certificate, and sending an authentication request frame to the AP through the data link, where the authentication request frame includes the authentication request frame MAC address and certificate, the certificate is issued by ASU and pre-stored in the mobile RFID reader;
  • MAC Media Access Control
  • the mobile RFID reader reads the electronic tag data and determines that a data link exists between the AP and the AP, the electronic tag is sequentially stored in the mobile RFID reader/writer;
  • the mobile RFID reader/writer 11 specifically includes:
  • Flash memory 22 configured to store a certificate issued by the ASU; a front-end tag reader/writer 21 for reading electronic tag data;
  • the certificate generating module 23 is configured to: when the data link between the terminal communication module and the AP does not exist, write the read electronic tag data into the certificate;
  • the terminal communication module 24 is configured to establish a data link with the AP according to the MAC address of the legal AP stored in the certificate, and send an authentication request frame to the AP through the data link.
  • the terminal communication module is mainly used to complete the WAPI.
  • Network communication specifically the communication between the mobile RFID reader and the AP;
  • the flash memory 22 is further configured to store electronic tag data;
  • the front-end tag reader/writer 21 is further configured to, after reading the electronic tag data, store the read electronic tag data in the flash memory when determining that there is a data link between the terminal communication module and the AP;
  • the certificate is issued by ASU.
  • ASU issues a certificate for each mobile RFID reader to identify the mobile RFID reader.
  • the certificate issued by ASU can be pre-stored on the mobile by manual copy or over-the-air download.
  • the certificate is in GBW format. See Figure 3 for the content and format of the certificate.
  • the certificate holder and the issuer's naming are not defined in detail in the GB 15629.11 standard used by WAPI. Only 6 is defined.
  • 256-byte variable length field Its purpose is to uniquely identify the holder and issuer of the certificate.
  • the current mainstream standards in the RFID field, EPC (Electronic Product Code) and UID (User Identification), use 96-bit and 128-bit electronic tags, respectively, even for future expansion. It is sufficient for storing the electronic tag for a maximum of 256 bytes of the holder field in the certificate.
  • writing the data of the electronic tag into the certificate means that the data of the electronic tag is written into the storage space after the sixth byte of the certificate holder name field in the certificate, and the first six bytes of the storage store the mobile type.
  • the MAC address of the RFID reader, the certificate issuer name field is fixed with 6 bytes to store the MAC address of the legal AP;
  • the certificate contains the public key information.
  • the ASU corresponds to the private key information.
  • the public key information can be used to encrypt the certificate, and the ASU can pass the private key. The information is decrypted to verify the validity of the certificate;
  • the terminal communication module of the mobile RFID reader establishes a data link with the AP according to the MAC address of the legal AP stored in the certificate, specifically: the mobile RFID reader is based on the legal AP stored in the certificate.
  • the MAC address initiates a discovery request to the AP, and receives the AP return. After the search response is returned, a data link is established between the AP and the AP;
  • the AP wireless access point 12 is configured to receive an authentication request frame sent by the mobile RFID reader, and determine that the MAC address of the authentication request frame is in a MAC address list of the mobile RFID reader pre-stored by the AP, and The authentication request frame is sent to the ASU;
  • the AP determines that the MAC address of the authentication request frame is not in the MAC address list of the mobile RFID reader pre-stored by the AP, it determines that the access is illegal access, discards the authentication request frame, and deletes the AP and the a data link between mobile RFID readers;
  • the mobile RFID reader sends a search request to the AP, and the AP is configured to receive the search request sent by the mobile RFID reader 11 and return a search response to the mobile RFID reader, and the mobile RFID reader receives the search. Responding to establishing a data link with the AP;
  • the ASU authentication server 13 is configured to receive an authentication request frame sent by the AP, and request the authentication to the central information system;
  • the ASU verifies the certificate by the public key of the certificate. Specifically: When issuing the certificate, the ASU sets the public key information for each certificate, and sets the private key information for each public key information in the ASU. The mobile RFID reader When the authentication request frame is sent, the public key information is used to encrypt the certificate. When the ASU receives the authentication request frame, the ASU decrypts the certificate by using the private key information to verify the validity of the certificate.
  • the AP When the ASU determines that the certificate is illegal, the AP is notified to block the subsequent access authentication request of the user of the MAC address; wherein, when the ASU determines that the certificate is illegal, the ASU may be faulty, or the pseudo terminal may spoof the AP, no matter which The fault is notified to the AP to block the subsequent access authentication request of the user of the MAC address, issue an alarm, and perform a fault check;
  • the backup certificate in the mobile RFID reader can be taken out and stored in another legal mobile RFID reader, and the backup certificate is used for verification. If the verification fails, the description is The authentication facility is faulty, that is, the ASU or AP is faulty. Performing a fault check, if the verification is passed, it indicates that the pseudo terminal spoofs the AP, and needs to block the subsequent access authentication request of the MAC address user, thereby avoiding the denial of service attack initiated by the mobile RFID reader;
  • the central information system 14 is used to receive electronic tag data sent by the ASU.
  • the above system can complete the secure transmission of the electronic tag data read by the mobile RFID reader to the central information system.
  • the central information system When the central information system receives the electronic tag data sent by the ASU, it can directly notify the AP to disconnect the data link with the mobile RFID reader, and then follow the same steps to transmit the next electronic tag. Electronic tag data is securely transmitted to the central information system.
  • whether or not to perform key agreement for data communication may be selected according to the application, in the above system:
  • the AP is further configured to perform a key agreement with the mobile RFID reader to establish a secure data link when receiving a write operation request from the central information system, and send the write data sent by the central information system to the mobile RFID read.
  • the central information system is further configured to: when determining that the electronic tag data needs to be written, send a write operation request to the AP, and send the write data to the AP;
  • the key negotiation between the AP and the mobile RFID reader ensures the security of data transmission between the mobile RFID reader and the AP, and the data sent by the central information system to the AP can be safely written into the mobile RFID.
  • the mobile RFID reader can continue to securely store the stored electronic tag data to the AP and send it to the central information system by the AP.
  • the AP is also used to determine the mobile RFID when receiving a query request from the central information system.
  • the reader/writer stores electronic tag data, performs key agreement with the mobile RFID reader to establish a secure data communication link, and receives the electronic tag sent by the mobile RFID reader and sends it to the central information system. After determining that the electronic tag data transmission in the mobile RFID reader is completed, disconnecting the data link with the mobile RFID reader;
  • the central information system is further configured to: when determining that the electronic tag data is not required to be written, send a query request to the AP, and receive the electronic tag data returned by the AP;
  • the AP disconnects the data link with the mobile RFID reader.
  • the AP When receiving the inquiry request from the central information system, the AP directly disconnects the data link between the mobile RFID reader and the mobile RFID reader when it is determined that the untransmitted electronic tag data is not stored in the mobile RFID reader/writer.
  • the AP, the ASU, and the central information system are connected by wire, and the AP can flexibly select the erection location according to the space situation, the mobile RFID reader is within the space covered by the AP, and the AP and the mobile RFID read
  • the inter-writer is a wireless connection; and the electronic tag used by the user is no different from the conventional electronic tag.
  • An embodiment of the present invention further provides a data transmission method for an RFID system. Referring to FIG. 4, the method includes:
  • the mobile RFID reader reads the electronic tag data
  • the front-end tag reader of the mobile RFID reader can read the electronic tag data
  • the mobile RFID reader determines whether there is a data link between the AP and the AP, if the determination result is yes, step S403 is performed, and if the determination result is no, step S404 is performed;
  • the mobile RFID reader determines whether there is a data link between the AP and the AP.
  • the terminal communication module of the mobile RFID reader communicates with the AP. If the terminal communication module communicates with the AP, the mobile is indicated. There is a data link between the RFID reader and the AP. If there is no data communication between the terminal communication module and the AP, the mobile RFID reader and the mobile There is no data link between APs;
  • the front-end tag reader/writer reads the read electronic tags sequentially into the flash memory
  • the certificate generation module writes the read electronic tag data into the certificate;
  • the tag data is written into the storage space after the 6th byte of the certificate holder name field of the certificate;
  • the mobile RFID reader establishes a data link with the AP according to the legal AP address of the AP stored in the certificate, and sends an authentication request frame to the AP.
  • the AP receives the authentication request frame, and determines whether the MAC address of the authentication request frame is in the MAC address list of the mobile RFID reader stored in advance by the AP. If the determination result is yes, step S408 is performed, and if the determination result is no, the execution is performed. Step S407;
  • the AP determines that the access is an illegal access, discards the authentication request frame, and deletes a data link between the AP and the mobile RFID reader.
  • the AP sends an authentication request frame to the ASU.
  • step S411 the ASU verifies the certificate in the authentication request frame, and verifies whether the certificate is legal. If the judgment result is yes, step S411 is performed, and if the determination result is no, step S410 is performed;
  • the AP is notified to block the subsequent access authentication request of the user of the MAC address, and the alarm is sent;
  • the electronic tag data in the certificate is extracted and sent to the central information system
  • the central information system receives the electronic tag data sent by the ASU, and determines whether the electronic tag needs to be written, if the determination result is yes, step S413 is performed, and if the determination result is no, step S414 is performed; After receiving the electronic tag data sent by the ASU, the central information system completes the access of the WAPI network and the transmission process of the electronic tag data to the central information system, thereby improving the security of the wireless network-based RFID system and transmitting the data. Once completed, it improves the efficiency of the network. Further, the central information system performs the judgment operation of the electronic tag data and the execution of the subsequent steps, so as to enable the interaction between the central information system and the mobile RFID reader to ensure the secure transmission of subsequent data;
  • the AP receives the query request, determines whether the mobile RFID reader stores the untransmitted electronic tag data, and if the determination result is yes, step S416 is performed, and if the determination result is no, step S417 is performed;
  • the AP and the mobile RFID reader perform key agreement, and transmit data. After the data is transmitted, the data link is disconnected between the AP and the mobile RFID reader;
  • step S413 if the data needs to be written to the mobile RFID reader, when the AP receives the data of the central information system and performs key agreement with the mobile RFID reader to establish a secure data link, the AP will Write data to the mobile RFID reader;
  • step S415 if the mobile RFID reader further stores untransmitted electronic tag data, the AP and the mobile RFID reader perform key agreement to establish a secure data link, and the mobile RFID reader The AP sends the electronic tag data;
  • the mobile RFID reader if the mobile RFID reader is not used for a long time, the data link with the AP has not yet been established, and the mobile RFID reader reads the electronic tag data and writes the mobile Terminal communication of mobile RFID readers in the storage space after the 6th byte of the certificate holder name field of the WAPI certificate stored in the RFID reader/writer
  • the module will use the certificate to complete the two-way authentication with the AP to establish a secure data link.
  • the ASU extracts the electronic tag data in the certificate and sends it to the central information system. Secure transmission of electronic tag data within an RFID system.
  • the mobile RFID reader If the mobile RFID reader is frequently used, for example, during the peak hours of work, the mobile RFID reader reads the electronic tag data, determines that there is a data link with the AP, and stores a large amount of electronic tag data in sequence.
  • the AP In the Flash memory area of the mobile RFID reader, after completing the first two-way identity authentication, the AP performs key agreement with the mobile RFID reader to establish a secure data link between the mobile RFID reader and the AP. Road, thus establishing a complete data communication link between the mobile RFID reader and the central information system. Therefore, the electronic tag data in the Flash no longer needs to be written into the certificate holder name field of the WAPI certificate and directly Transfer to the central information system to complete the transmission of data.
  • the RFID system applies the WAPI access authentication mechanism to the RFID system, greatly improves the security of the WLAN network-based RFID system, and can write the electronic tag data into the WAPI certificate, so that WAPI network access and data transmission are completed at one time, which greatly improves the operating efficiency of the network.
  • WAPI network access and data transmission are completed at one time, which greatly improves the operating efficiency of the network.
  • it is fully compatible with the existing passive tag data format and the communication protocol between the tag and the mobile RFID reader, so it is easy to promote.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

一种 RFID系统、 读写器及数据传输方法 技术领域
本发明涉及射频识别领域,尤其是涉及一种 RFID系统、读写器及 RFID 系统中的数据传输方法。 背景技术
射频识别 (Radio Frequency Identification, RFID )使用射频信号通过 RFID 读写器读取用户终端内的电子标签(Tag )信息并解码后, 送至中央 信息系统对用户进行识别、 管理相关数据。 其非接触式的自动识别、 无须 人工干预, 并可同时识别多个标签等优点, 使得该技术被广泛被应用于物 流、 考勤、 电子商务等领域, 且规模巨大。
而伴随着无线局域网( Wireless Local Area Network, WLAN )技术的发 展,逐渐出现了可移动式 RFID阅读器,可移动式 RFID阅读器可通过 WLAN 与中央信息系统进行数据传输,从而突破了 RFID技术应用的地域限制且效 率大大提高。 但由此带来的安全性问题日益突出, 基于最新的 802.11标准 的 WLAN依然存在破解隐患,使得基于 WLAN构架的可移动式 RFID的应 用受到了限制。
WAPI ( Wireless LAN Authentication and Privacy Infrastructure , 无线局 域网鉴别和保密基础结构) 的出现使得这一难题的解决成为可能。 WAPI 由认证基础设施 WAI ( Wireless LAN Authentication Infrastructure, 无线局 域网鉴别基础结构) 和保密基础设施 WPI ( Wireless LAN Privacy Infrastructure,无线局域网保密基础结构)组成。 WAI负责鉴别和密钥管理, 通过 STA、 AP( Access Point,无线接入点)、 ASU( Authentication Service Unit, 鉴别服务器)三物理实体的双向认证进行鉴别。 其中鉴别服务器 ASU是整 个 WAI的核心和基础, 其主要功能是实现对用户证书的管理和用户身份的 识别。 WAPI用户证书为公钥证书, 通过私钥验证可以唯一地确定网络用户 的身份。 同时, WAPI的这种证书可以被用来加载电子标签内的信息。
但 WAPI在传输数据时需要先进行双向认证, 认证通过后, 再进行数 据传输, 存在认证效率不高的问题, 应用于 RFID领域尚存在一定的瓶颈, 仍然无法解决基于 WLAN网络的 RFID系统面临的安全问题。 发明内容
本发明提供一种 RFID系统、 读写器及 RFID系统的数据传输方法, 能 够解决现有的基于 WLAN网络的 RFID系统面临的安全问题以及提高网络 的运行效率。
为达到上述目的, 本发明的技术方案是这样实现的:
本发明提供了一种射频识别 RFID系统, 包括: 移动式射频识别(RFID 读写器)、 无线接入点(AP )、 鉴别服务器(ASU )和中央信息系统; 其中: 移动式射频识别 (RFID )读写器, 用于读取电子标签数据, 并当移动 式 RFID读写器与 AP间没有数据链路时, 将读取的电子标签数据写入无线 局域网鉴别和保密基础结构 (WAPI )证书中, 并根据 WAPI证书中存储的 合法的 AP的介质访问控制( MAC )地址建立与 AP间的数据链路, 通过数 据链路向 AP发送鉴别请求帧,其中鉴别请求帧中包含 WAPI证书以及鉴别 请求帧的 MAC地址, WAPI证书由 ASU颁发并预先存储在移动式 RFID读 写器中;
AP,用于接收鉴别请求帧,并确定鉴别请求帧的 MAC地址在 AP中预 先存储的移动式 RFID读写器的 MAC地址列表中, 将鉴别请求帧发送给 ASU;
ASU, 用于接收 AP发送的鉴别请求帧, 对鉴别请求帧中的 WAPI证书 进行验证,确定 WAPI证书合法则提取 WAPI证书中的电子标签数据并发送 到中央信息系统;
中央信息系统, 用于接收 ASU发送的电子标签数据。
进一步地, 所述移动式 RFID读写器, 还用于当所述移动式 RFID读写 器与 AP之间存在数据链路时, 将读取的电子标签数据存储。
进一步地, 所述移动式 RFID读写器, 还用于与 AP进行密钥协商, 并 接收 AP发送的写数据;
所述 AP, 还用于在接收到中央信息系统的写数据时, 与移动式 RFID 读写器进行密钥协商建立安全的数据链路, 并将中央信息系统发送的写数 据发送给移动式 RFID读写器;
所述中央信息系统, 还用于在确定需要对电子标签数据进行写操作时, 向 AP发送写数据。
进一步地, 所述 AP, 还用于在接收到中央信息系统的查询请求时, 确 定移动式 RFID读写器中存储有未传输的电子标签数据, 与移动式 RFID读 写器进行密钥协商建立安全的数据链路,并接收移动式 RFID读写器发送的 电子标签数据, 并发送到中央信息系统,在确定移动式 RFID读写器中的电 子标签数据传输完后, 断开与移动式 RFID读写器间的数据链路;
所述中央信息系统, 还用于在确定不需要对电子标签数据进行写操作 时, 向 AP发送查询请求。
进一步地, 所述 AP, 还用于在接收到中央信息系统的查询请求时, 确 定移动式 RFID读写器中未存储有未传输的电子标签数据时,断开与移动式 RFID读写器间的数据链路。
进一步地, 所述移动式 RFID读写器具体包括: 闪速存储器、 前端标签 读写器、 证书生成模块和终端通讯模块; 其中:
所述闪速存储器, 用于存储所述 ASU颁发的 WAPI证书;
所述前端标签读写器, 用于读取电子标签数据; 所述证书生成模块,用于当所述终端通讯模块与所述 AP间不存在数据 链路时, 将读取的电子标签数据写入 WAPI证书中;
所述终端通讯模块, 用于根据证书中存储的合法的 AP的 MAC地址建 立与所述 AP间的数据链路, 并通过数据链路向所述 AP发送鉴别请求帧, 其中鉴别请求帧中包含 WAPI证书以及鉴别请求帧的 MAC地址。
本发明还提供了一种移动式射频识别 RFID读写器,包括:闪速存储器、 前端标签读写器、 证书生成模块和终端通讯模块; 其中:
所述闪速存储器, 用于存储鉴别服务器 (ASU )颁发的无线局域网鉴 别和保密基础结构 ( WAPI )证书;
所述前端标签读写器, 用于读取电子标签数据;
所述证书生成模块, 用于当所述终端通讯模块与无线接入点 (AP ) 间 不存在数据链路时, 将读取的电子标签数据写入 WAPI证书中;
所述终端通讯模块,用于根据证书中存储的合法的 AP的介质访问控制 MAC地址建立与所述 AP间的数据链路, 并通过数据链路向所述 AP发送 鉴别请求帧,其中鉴别请求帧中包含 WAPI证书以及鉴别请求帧的 MAC地 址。
进一步地, 所述闪速存储器, 还用于存储电子标签数据;
所述前端标签读写器,还用于当所述终端通讯模块与 AP间存在数据链 路时, 将读取的电子标签数据存储在所述闪速存储器中。
本发明还提供了一种射频识别 RFID系统的数据传输方法, 包括: 移动式射频识别 (RFID )读写器读取电子标签数据, 并当与无线接入 点 (AP ) 间不存在数据链路时, 将电子标签数据写入无线局域网鉴别和保 密基础结构 (WAPI )证书中, 并根据证书中存储的合法的 AP的介质访问 控制 MAC地址建立与 AP间的数据链路, 通过数据链路向 AP发送鉴别请 求帧, 其中鉴别请求帧中包含证书以及鉴别请求帧的 MAC 地址, WAPI 证书由鉴别服务器 ASU颁发并预先存储在读写器中;
AP接收鉴别请求帧, 并确定鉴别请求帧的 MAC地址在 AP预先存储 的移动式 RFID读写器的 MAC地址列表中, 将鉴别请求帧发送给 ASU;
ASU接收 AP发送的鉴别请求帧, 对鉴别请求帧中的 WAPI证书进行 验证,确定 WAPI证书合法则提取 WAPI证书中的电子标签数据并发送到中 央信息系统;
中央信息系统接收 ASU发送的电子标签数据。
进一步地, 该方法还包括: 中央信息系统确定需要对电子标签数据进 行写操作时, 向 AP发送写数据;
AP在接收到写数据时, 与移动式 RFID读写器进行密钥协商建立安全 的数据链路, 并将写数据发送给移动式 RFID读写器。
与现有技术相比,本发明实施例由于在 RFID系统中利用 WAPI的接入 鉴别机制,能够将读写器读取的电子标签数据写入 WAPI证书中,并将 WAPI 证书添加到鉴别请求帧并发送到 AP,通过 AP的地址验证后 ,再发送到 ASU 进行证书验证, 当 ASU验证证书合法后, 提取证书中的电子标签数据发送 到中央信息系统。 利用上述方法, 将 WAPI的接入鉴别机制应用到 RFID系 统中 , 保证了基于 WLAN网络的 RFID系统的安全性, 并且使得 WAPI网 络的接入与 RFID数据传输一次完成, 极大地提高了网络的运行效率。
进一步, 当中央信息系统需要对电子标签数据进行写操作时, 或者当 读写器中还存在未传输的电子标签数据时, AP需要和读写器进行密钥协商 建立安全的数据链路, 完成后续中央信息系统与读写器间的数据传输。 附图说明
图 1为本发明实施例提供的 RFID系统结构图;
图 2为本发明实施例提供的移动式 RFID读写器的结构图;
图 3为本发明实施例提供的 WAPI证书的内容及格式示意图; 图 4为本发明实施例提供的 RFID系统的数据传输方法流程图。 具体实施方式
由于现有的基于无线网架构的 RFID系统,在数据传输时存在的安全性 问题, 本发明实施例提供一种 RFID系统, 能够将 WAPI的鉴别机制应用到 RFID系统中, 极大的提高了基于无线网络的 RFID系统的安全性, 并且能 够将电子标签数据写入 WAPI证书中 ,使得 WAPI网络的接入与 RFID系统 的电子标签数据传输一次完成, 极大地提高了网络的运行效率。
本发明实施例提供一种 RFID系统, 参阅图 1所示, 包括:
1、 移动式 RFID读写器 11 , 用于读取电子标签, 并当移动式 RFID读 写器与 AP尚没有建立数据链路时, 将电子标签的数据写入 WAPI证书 (简 称证书)中,并根据证书中存储的合法的 AP的 MAC( Media Access Control, 介质访问控制 )地址建立与 AP间的数据链路, 通过数据链路向 AP发送鉴 别请求帧, 其中鉴别请求帧中包含鉴别请求帧的 MAC地址以及证书,证书 由 ASU颁发并预先存储在移动式 RFID读写器中;
其中, 当移动式 RFID读写器读取到电子标签数据后, 确定与 AP间已 经存在数据链路时, 则依次将电子标签存储在移动式 RFID读写器中;
其中, 如图 2所示, 移动式 RFID读写器 11具体包括:
闪速存储器(Flash存储器) 22, 用于存储 ASU颁发的证书; 前端标签读写器 21 , 用于读取电子标签数据;
证书生成模块 23 , 用于当终端通讯模块与 AP间不存在数据链路时, 将读取的电子标签数据写入证书中;
终端通讯模块 24,用于根据证书中存储的合法的 AP的 MAC地址建立 与 AP间的数据链路, 并通过数据链路向 AP发送鉴别请求帧; 其中, 终端 通讯模块主要是用于完成 WAPI网络的通信,具体的是移动式 RFID读写器 与 AP间的通信; 其中, Flash存储器 22, 还用于存储电子标签数据;
前端标签读写器 21 , 还用于读取到电子标签数据后, 当确定终端通讯 模块和 AP间存在数据链路时, 将读取的电子标签数据顺序存储在 Flash存 储器中;
其中, 证书由 ASU颁发的, ASU为每一个移动式 RFID读写器颁发一 个证书, 用于标识移动式 RFID读写器, ASU颁发的证书可通过人工拷贝, 或者空中下载等方式预先存储在移动式 RFID读写器的 Flash存储器中, 并 在 Flash存储器中进行备份;
证书釆用 GBW格式, 参阅图 3所示, 为证书的内容及格式示意图, 在 WAPI所釆用的 GB 15629.11标准中未对证书持有者、 颁发者命名进行详细 定义, 只定义其为 6到 256字节的可变长字段。 其目的是为了唯一标识证 书持有者及颁发者。 而 RFID领域目前的主流标准 EPC ( Electronic Product Code, 电子产品代码)、 UID ( User Identification, 用户身份证明) 所釆用 的电子标签分别为 96位和 128位, 即便是用于未来扩展的 512位, 对于证 书中持有者字段的最大 256字节来说用于存储电子标签是足够的。 因此, 将电子标签的数据写入证书中即是将电子标签的数据写入证书中证书持有 者名称字段的第 6个字节之后的存储空间中, 其前 6个字节存储该移动式 RFID读写器的 MAC地址, 证书颁发者名称字段固定有 6字节用来存储合 法的 AP的 MAC地址;
同时证书中包含有公钥信息, 同时对每一个证书中的公钥信息, ASU 对应有私钥信息, 在移动式 RFID 读写器中可利用公钥信息对证书进行加 密, ASU可通过私钥信息进行解密, 以验证证书的合法性;
其中, 移动式 RFID 读写器的终端通讯模块根据证书中存储的合法的 AP的 MAC地址建立与 AP间的数据链路,具体为:移动式 RFID读写器根 据证书中存储的合法的 AP的 MAC地址向 AP发起探寻请求, 收到 AP返 回的探寻响应后, 建立与 AP间的数据链路;
2、 AP无线接入点 12, 用于接收移动式 RFID读写器发送的鉴别请求 帧, 并确定鉴别请求帧的 MAC地址在 AP预先存储的移动式 RFID读写器 的 MAC地址列表中, 将鉴别请求帧发送给 ASU;
当 AP确定鉴别请求帧的 MAC地址不在 AP预先存储的移动式 RFID 读写器的 MAC地址列表中时, 则判定此次接入为非法接入,丟弃该鉴别请 求帧, 并删除 AP与该移动式 RFID读写器间的数据链路;
其中, 移动式 RFID读写器向 AP发送探寻请求, AP用于接收移动式 RFID读写器 11发送的探寻请求, 并向移动式 RFID读写器返回探寻响应, 移动式 RFID读写器接收探寻响应建立与 AP间的数据链路;
3、 ASU鉴别服务器 13 , 用于接收 AP发送的鉴别请求帧, 对鉴别请求 到中央信息系统;
ASU通过证书的公钥对证书进行验证 , 具体的: ASU在颁发证书时 , 对每个证书设置公钥信息, 并在 ASU中对应每个公钥信息设置私钥信息, 移动式 RFID 读写器在发送鉴别请求帧时, 会利用公钥信息加密证书, 当 ASU接收到鉴别请求帧时, 会利用私钥信息解密证书, 以验证证书的合法 性;
当 ASU判定证书非法时, 则通知 AP堵塞该 MAC地址用户的后续接 入鉴别请求; 其中, 当 ASU判定证书非法时, 可能是 ASU故障, 也有可 能是伪终端对 AP进行了欺骗,不管是哪种故障,均通知 AP先堵塞该 MAC 地址用户的后续接入鉴别请求, 发出报警, 并进行故障检查;
其中, 检查故障时, 可釆用将移动式 RFID读写器中的备份证书取出, 并存储到另外一个合法的移动式 RFID读写器中, 利用备份证书进行验证, 如果验证未通过, 则说明鉴别设施出现故障, 即是 ASU或 AP故障, 需要 进行故障检查, 如果验证通过, 则说明是伪终端对 AP进行了欺骗, 需要堵 塞该 MAC地址用户的后续接入鉴别请求, 能够避免从移动式 RFID读写器 发起的拒绝服务攻击;
4、 中央信息系统 14, 用于接收 ASU发送的电子标签数据。
上述系统能够完成移动式 RFID读写器读取的电子标签数据到中央信 息系统的安全传输。
当中央信息系统接收到 ASU发送的电子标签数据后, 可直接通知 AP 断开与移动式 RFID读写器间的数据链路,再依照同样的步骤进行下一个电 子标签的传输, 这样可以实现将电子标签数据安全传输到中央信息系统。
较佳的,为了能够实现中央信息系统与移动式 RFID读写器中数据的安 全及快速交互, 在上述系统中还可以根据应用场合选择是否进行密钥协商 完成数据通信, 上述系统中:
AP, 还用于在接收到中央信息系统的写操作请求时, 与移动式 RFID 读写器进行密钥协商建立安全的数据链路, 并将中央信息系统发送的写数 据发送给移动式 RFID读写器;
中央信息系统, 还用于在确定需要对电子标签数据进行写操作时, 向 AP发送写操作请求, 并将写数据发送给 AP;
其中, AP与移动式 RFID读写器间进行密钥协商,保证了移动式 RFID 读写器与 AP之间数据传输的安全性, 中央信息系统发送给 AP的数据能够 安全的写入移动式 RFID读写器中, 并且进行密钥协商后, 移动式 RFID读 写器能够将存储的电子标签数据继续安全的发送给 AP, 并由 AP发送给中 央信息系统。
较佳的, 为了能够实现大量电子标签数据的安全及快速传输, 上述系 统中:
AP, 还用于在接收到中央信息系统的查询请求时, 确定移动式 RFID 读写器中存储有电子标签数据,与移动式 RFID读写器进行密钥协商建立安 全的数据通信链路, 并接收移动式 RFID读写器发送的电子标签, 并发送到 中央信息系统, 在确定移动式 RFID读写器中的电子标签数据传输完成后, 断开与移动式 RFID读写器间的数据链路;
中央信息系统, 还用于在确定不需要对电子标签数据进行写操作时, 向 AP发送查询请求, 并接收 AP返回的电子标签数据;
其中, AP与移动式 RFID读写器均完成数据传输后, AP断开与移动式 RFID读写器间的数据链路。
其中, AP在接收到中央信息系统的查询请求时, 当确定移动式 RFID 读写器中未存储有未传输的电子标签数据时,直接断开与移动式 RFID读写 器间的数据链路。
其中, 在上述系统中, AP、 ASU、 中央信息系统通过有线连接, 并且 AP可根据空间情况灵活选择架设地点, 移动式 RFID读写器在 AP覆盖的 空间范围内, 且 AP与移动式 RFID读写器间是无线连接; 并且用户使用的 电子标签与一般的传统的电子标签没有任何区别。
本发明实施例还提供一种 RFID系统的数据传输方法, 参阅图 4所示, 包括:
5401、 移动式 RFID读写器读取电子标签数据;
其中, 移动式 RFID读写器的前端标签读写器能够读取电子标签数据;
5402、 移动式 RFID读写器判断与 AP间是否存在数据链路, 判断结果 为是时, 执行步骤 S403 , 判断结果为否时, 执行步骤 S404;
移动式 RFID读写器判断与 AP间是否存在数据链路是指移动式 RFID 读写器的终端通讯模块是否与 AP间在进行通信, 如果终端通讯模块与 AP 间在进行数据通信, 则说明移动式 RFID读写器与 AP间存在数据链路, 如 果终端通讯模块与 AP间没有进行数据通信, 则说明移动式 RFID读写器与 AP间不存在数据链路;
5403、 将读取的电子标签数据存储;
前端标签读写器将读取的电子标签顺次存储到 Flash存储器中;
5404、 将电子标签数据写入证书中;
若不存在数据链路,说明该移动式 RFID读写器长时间没有使用, 尚没 有与 AP 建立数据链路, 则证书生成模块将读取的电子标签数据写入证书 中; 具体的: 将电子标签数据写入证书的证书持有者名称字段的第 6个字 节之后的存储空间中;
5405、 移动式 RFID读写器根据证书中存储的合法的 AP的 MAC地址 建立与 AP间的数据链路, 并向 AP发送鉴别请求帧;
5406、 AP接收鉴别请求帧, 判断鉴别请求帧的 MAC地址是否在 AP 预先存储的移动式 RFID读写器的 MAC地址列表中, 判断结果为是时, 执 行步骤 S408 , 判断结果为否时, 执行步骤 S407;
5407、 AP判定此次接入为非法接入, 丟弃该鉴别请求帧, 并删除 AP 与该移动式 RFID读写器间的数据链路;
S408、 AP将鉴别请求帧发送给 ASU;
5409、 ASU对鉴别请求帧中的证书进行验证, 验证证书是否合法, 判 断结果为是时, 执行步骤 S411 , 判断结果为否时, 执行步骤 S410;
5410、 ASU判定证书非法,则通知 AP堵塞该 MAC地址用户的后续接 入鉴别请求, 并发出 警;
5411、 ASU判定证书合法, 则提取证书中的电子标签数据并发送到中 央信息系统;
5412、 中央信息系统接收 ASU发送的电子标签数据, 并判定是否需要 对电子标签进行写操作, 判断结果为是时, 执行步骤 S413 , 判断结果为否 时, 执行步骤 S414; 其中, 中央信息系统接收到 ASU发送的电子标签数据后, 即完成了 WAPI网络的接入以及电子标签数据到中央信息系统的传输过程,提高了基 于无线网络的 RFID系统的安全性并将数据传输一次完成,提高了网络的运 行效率。 进一步, 中央信息系统对电子标签数据的判断操作及后续步骤的 执行, 为了使得中央信息系统与移动式 RFID 读写器间的数据能够实现交 互, 保证后续数据的安全传输;
5413、 向 AP发送写数据, 执行步骤 S416;
5414、 向 AP发送查询请求;
5415、 AP接收到查询请求, 判定移动式 RFID读写器中是否存储有未 传输的电子标签数据, 判断结果为是时, 执行步骤 S416, 判断结果为否时, 执行步骤 S417;
5416、 AP与移动式 RFID读写器间进行密钥协商, 并传输数据, 数据 传输完后, AP与移动式 RFID读写器间断开数据链路;
其中,承接步骤 S413若需要向移动式 RFID读写器写数据, AP在接收 到中央信息系统的写数据时,与移动式 RFID读写器进行密钥协商建立安全 的数据链路后, AP将写数据发送给移动式 RFID读写器;
承接步骤 S415 , 若移动式 RFID读写器中还存储有未传输的电子标签 数据, 则 AP与移动式 RFID读写器进行密钥协商建立安全的数据链路后, 移动式 RFID读写器向 AP发送电子标签数据;
S417、若移动式 RFID读写器中没有未传输的电子标签数据, 则不用进 行密钥协商, AP与移动式 RFID读写器间直接断开数据链路。
釆用本发明实施例的系统及方法,若移动式 RFID阅读器长时间没有使 用, 尚没有建立与 AP间的数据链路, 移动式 RFID读写器读取到电子标签 数据后, 写入移动式 RFID读写器内 Flash存储的 WAPI证书的证书持有者 名称字段的第 6个字节之后的存储空间中,移动式 RFID读写器的终端通讯 模块将使用该证书与 AP完成双向认证建立安全的数据链路, 在此过程中, 当证书被传送到 ASU时, ASU将证书中的电子标签数据提取出来, 并发送 到中央信息系统, 完成了电子标签数据在 RFID系统内的安全传输。
若移动式 RFID读写器频繁使用的时候, 例如上下班高峰期, 移动式 RFID读写器读取到电子标签数据后, 确定与 AP间存在数据链路, 将大量 的电子标签数据依次存储在移动式 RFID读写器的 Flash存储区中, 在完成 首次双向身份认证后, AP与移动式 RFID读写器进行密钥协商, 在移动式 RFID读写器和 AP之间建立起安全的数据链路, 从而建立起移动式 RFID 读写器和中央信息系统的完整的数据通信链路, 因此, Flash中的电子标签 数据则不再需要写入到 WAPI证书的证书持有者名称字段而直接被传送到 中央信息系统完成数据的传输。
本发明实施例提供的 RFID系统,将 WAPI的接入鉴别机制应用到 RFID 系统中, 极大的提高了基于 WLAN网络的 RFID系统的安全性, 并且能够 将电子标签数据写入 WAPI证书中,使得 WAPI网络接入和数据传输一次完 成, 极大地提高了网络的运行效率。 并且, 由于不需要对现有的终端所使 用的电子标签进行任何改造, 只需要升级移动式 RFID读写器, 以及架设 AP, 因此成本不会大幅增加, 适合大规模应用。 并且由于不需要对电子标 签进行任何改造, 因此, 能够全面兼容现有的无源标签数据格式以及标签 和移动式 RFID读写器之间的通信协议, 因此易于推广使用。 同时, 本发明 实施例釆用的方案可以更有效的对抗针对 WAPI 网络的拒绝服务攻击, 并 且不违背目前的 WAPI标准, 适合推广应用。 本发明的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权 利要求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在 内。

Claims

权利要求书
1、一种射频识别 RFID系统,其特征在于,包括:移动式射频识别(RFID 读写器)、 无线接入点(AP )、 鉴别服务器(ASU )和中央信息系统; 其中: 移动式射频识别 (RFID )读写器, 用于读取电子标签数据, 并当移动 式 RFID读写器与 AP间没有数据链路时, 将读取的电子标签数据写入无线 局域网鉴别和保密基础结构 (WAPI )证书中, 并根据 WAPI证书中存储的 合法的 AP的介质访问控制( MAC )地址建立与 AP间的数据链路, 通过数 据链路向 AP发送鉴别请求帧,其中鉴别请求帧中包含 WAPI证书以及鉴别 请求帧的 MAC地址, WAPI证书由 ASU颁发并预先存储在移动式 RFID读 写器中;
AP,用于接收鉴别请求帧,并确定鉴别请求帧的 MAC地址在 AP中预 先存储的移动式 RFID读写器的 MAC地址列表中, 将鉴别请求帧发送给 ASU;
ASU, 用于接收 AP发送的鉴别请求帧, 对鉴别请求帧中的 WAPI证书 进行验证,确定 WAPI证书合法则提取 WAPI证书中的电子标签数据并发送 到中央信息系统;
中央信息系统, 用于接收 ASU发送的电子标签数据。
2、 如权利要求 1所述的系统, 其特征在于, 所述移动式 RFID读写器, 还用于当所述移动式 RFID读写器与 AP之间存在数据链路时, 将读取的电 子标签数据存储。
3、 如权利要求 1或 2所述的系统, 其特征在于, 所述移动式 RFID读 写器, 还用于与 AP进行密钥协商, 并接收 AP发送的写数据;
所述 AP, 还用于在接收到中央信息系统的写数据时, 与移动式 RFID 读写器进行密钥协商建立安全的数据链路, 并将中央信息系统发送的写数 据发送给移动式 RFID读写器; 所述中央信息系统, 还用于在确定需要对电子标签数据进行写操作时, 向 AP发送写数据。
4、 如权利要求 1或 2所述的系统, 其特征在于,
所述 AP , 还用于在接收到中央信息系统的查询请求时, 确定移动式 RFID读写器中存储有未传输的电子标签数据, 与移动式 RFID读写器进行 密钥协商建立安全的数据链路,并接收移动式 RFID读写器发送的电子标签 数据, 并发送到中央信息系统, 在确定移动式 RFID读写器中的电子标签数 据传输完后, 断开与移动式 RFID读写器间的数据链路;
所述中央信息系统, 还用于在确定不需要对电子标签数据进行写操作 时, 向 AP发送查询请求。
5、 如权利要求 4所述的系统, 其特征在于, 所述 AP, 还用于在接收 到中央信息系统的查询请求时,确定移动式 RFID读写器中未存储有未传输 的电子标签数据时, 断开与移动式 RFID读写器间的数据链路。
6、 如权利要求 1所述的系统, 其特征在于, 所述移动式 RFID读写器 具体包括: 闪速存储器、 前端标签读写器、 证书生成模块和终端通讯模块; 其中:
所述闪速存储器, 用于存储所述 ASU颁发的 WAPI证书;
所述前端标签读写器, 用于读取电子标签数据;
所述证书生成模块,用于当所述终端通讯模块与所述 AP间不存在数据 链路时, 将读取的电子标签数据写入 WAPI证书中;
所述终端通讯模块, 用于根据证书中存储的合法的 AP的 MAC地址建 立与所述 AP间的数据链路, 并通过数据链路向所述 AP发送鉴别请求帧, 其中鉴别请求帧中包含 WAPI证书以及鉴别请求帧的 MAC地址。
7、 一种移动式射频识别 RFID读写器, 其特征在于, 包括: 闪速存储 器、 前端标签读写器、 证书生成模块和终端通讯模块; 其中: 所述闪速存储器, 用于存储鉴别服务器 (ASU )颁发的无线局域网鉴 别和保密基础结构 ( WAPI )证书;
所述前端标签读写器, 用于读取电子标签数据;
所述证书生成模块, 用于当所述终端通讯模块与无线接入点 (AP ) 间 不存在数据链路时, 将读取的电子标签数据写入 WAPI证书中;
所述终端通讯模块,用于根据证书中存储的合法的 AP的介质访问控制 MAC地址建立与所述 AP间的数据链路, 并通过数据链路向所述 AP发送 鉴别请求帧,其中鉴别请求帧中包含 WAPI证书以及鉴别请求帧的 MAC地 址。
8、 如权利要求 7所述的读写器, 其特征在于, 所述闪速存储器, 还用 于存储电子标签数据;
所述前端标签读写器,还用于当所述终端通讯模块与 AP间存在数据链 路时, 将读取的电子标签数据存储在所述闪速存储器中。
9、 一种射频识别 RFID系统的数据传输方法, 其特征在于, 包括: 移动式射频识别 (RFID )读写器读取电子标签数据, 并当与无线接入 点 (AP ) 间不存在数据链路时, 将电子标签数据写入无线局域网鉴别和保 密基础结构 (WAPI )证书中, 并根据证书中存储的合法的 AP的介质访问 控制 MAC地址建立与 AP间的数据链路, 通过数据链路向 AP发送鉴别请 求帧, 其中鉴别请求帧中包含证书以及鉴别请求帧的 MAC 地址, WAPI 证书由鉴别服务器 ASU颁发并预先存储在读写器中;
AP接收鉴别请求帧, 并确定鉴别请求帧的 MAC地址在 AP预先存储 的移动式 RFID读写器的 MAC地址列表中, 将鉴别请求帧发送给 ASU;
ASU接收 AP发送的鉴别请求帧, 对鉴别请求帧中的 WAPI证书进行 验证,确定 WAPI证书合法则提取 WAPI证书中的电子标签数据并发送到中 央信息系统; 中央信息系统接收 ASU发送的电子标签数据。
10、 如权利要求 9所述的方法, 其特征在于, 该方法还包括: 中央信息系统确定需要对电子标签数据进行写操作时,向 AP发送写数 据;
AP在接收到写数据时, 与移动式 RFID读写器进行密钥协商建立安全 的数据链路, 并将写数据发送给移动式 RFID读写器。
PCT/CN2010/080387 2010-05-24 2010-12-28 一种rfid系统、读写器及数据传输方法 WO2011147183A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2010101834375A CN101853409B (zh) 2010-05-24 2010-05-24 一种rfid系统、读写器及数据传输方法
CN201010183437.5 2010-05-24

Publications (1)

Publication Number Publication Date
WO2011147183A1 true WO2011147183A1 (zh) 2011-12-01

Family

ID=42804887

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/080387 WO2011147183A1 (zh) 2010-05-24 2010-12-28 一种rfid系统、读写器及数据传输方法

Country Status (2)

Country Link
CN (1) CN101853409B (zh)
WO (1) WO2011147183A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914714A (zh) * 2012-12-31 2014-07-09 西门子公司 用于电子标签初始化的系统
CN116132986A (zh) * 2022-12-16 2023-05-16 中国铁塔股份有限公司 一种数据传输方法、电子设备及存储介质

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853409B (zh) * 2010-05-24 2013-08-07 中兴通讯股份有限公司 一种rfid系统、读写器及数据传输方法
CN102143488B (zh) * 2010-12-06 2013-06-12 西安西电捷通无线网络通信股份有限公司 一种读写器与电子标签安全通信的方法
CN102156841A (zh) * 2011-04-08 2011-08-17 中国电子技术标准化研究所 有源电子标签中文件的访问控制方法
CN102740291A (zh) * 2011-04-12 2012-10-17 广州盛华信息技术有限公司 一种实现wapi鉴证的系统及方法
CN103218629A (zh) * 2012-01-18 2013-07-24 玺瑞股份有限公司 无线通讯方法
CN103686730B (zh) * 2013-12-27 2016-11-09 北京奇虎科技有限公司 一种有源rfid移动终端及其进行网络鉴权的方法
CN107784814B (zh) * 2016-08-24 2020-11-27 浙江汉朔电子科技有限公司 数据交互系统
CN106792469B (zh) * 2016-12-28 2020-01-03 南京贝娇瑞信息科技有限公司 一种基于rfid技术的无线局域网接入方法
CN110502935A (zh) * 2019-08-28 2019-11-26 深圳市安信达存储技术有限公司 一种可自动授权的加密式固态硬盘及自动授权方法
CN113242060B (zh) * 2021-04-01 2022-07-05 青岛海尔科技有限公司 接入网络的方法和装置、存储介质及电子装置
CN113612780B (zh) * 2021-08-05 2023-04-07 中国电信股份有限公司 证书请求、生成、接入方法、装置、通信设备及介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609512A (zh) * 2008-06-18 2009-12-23 中兴通讯股份有限公司 基于射频识别的通用业务处理方法及系统
CN101853409A (zh) * 2010-05-24 2010-10-06 中兴通讯股份有限公司 一种rfid系统、读写器及数据传输方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100593936C (zh) * 2008-05-09 2010-03-10 西安西电捷通无线网络通信有限公司 一种基于wapi的漫游认证方法
CN101676928B (zh) * 2008-09-16 2011-12-07 华为技术有限公司 射频识别方法、设备及系统

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609512A (zh) * 2008-06-18 2009-12-23 中兴通讯股份有限公司 基于射频识别的通用业务处理方法及系统
CN101853409A (zh) * 2010-05-24 2010-10-06 中兴通讯股份有限公司 一种rfid系统、读写器及数据传输方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914714A (zh) * 2012-12-31 2014-07-09 西门子公司 用于电子标签初始化的系统
CN103914714B (zh) * 2012-12-31 2017-03-01 西门子公司 用于电子标签初始化的系统
CN116132986A (zh) * 2022-12-16 2023-05-16 中国铁塔股份有限公司 一种数据传输方法、电子设备及存储介质

Also Published As

Publication number Publication date
CN101853409A (zh) 2010-10-06
CN101853409B (zh) 2013-08-07

Similar Documents

Publication Publication Date Title
WO2011147183A1 (zh) 一种rfid系统、读写器及数据传输方法
CN101867929B (zh) 认证方法、系统、认证服务器和终端设备
CN102348209B (zh) 接入无线网络及其认证的方法和设备
CN101777978B (zh) 一种基于无线终端的数字证书申请方法、系统及无线终端
CN103634270A (zh) 识别接入点合法性的方法、系统与接入点鉴别服务器
TWI403145B (zh) 無線網路認證系統及其方法
CN101916459B (zh) 一种安全电子票方法
KR20130030451A (ko) 네트워크의 접속 보안 강화 장치 및 방법
CN109412792A (zh) 数字证书的生成、认证方法、通信设备及存储介质
CN102026180A (zh) M2m传输控制方法、装置及系统
JP2012084156A (ja) 近距離無線通信装置及び近距離無線通信方法
CN105792194A (zh) 基站合法性的认证方法、认证装置、网络设备、认证系统
CN101976363A (zh) 一种基于Hash函数的RFID认证方法
WO2016155112A1 (zh) 一种物联网设备的认证方法及终端
CN104424676A (zh) 身份信息发送方法、装置和门禁读卡器及门禁系统
CN102271133A (zh) 认证方法、装置和系统
KR20160131572A (ko) 이동 통신 시스템에서 결제 관련 정보 인증 방법 및 장치
CN101039181B (zh) 防止通用鉴权框架中服务功能实体受攻击的方法
WO2018176670A1 (zh) 一种无线通信的握手方法及设备
CN103457724A (zh) 一种进行点对点数据安全传输的方法和系统
CN103856940A (zh) 安全认证方法和系统
CN106452999A (zh) 一种智能家电及安全访问智能家电的方法和装置
CN102932338B (zh) 一种安全的射频识别系统的网络接入系统及方法
US20240129727A1 (en) Method and apparatus for managing event for smart secure platform
CN102857517A (zh) 认证方法、宽带远程接入服务器以及认证服务器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10852052

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10852052

Country of ref document: EP

Kind code of ref document: A1