WO2012119434A1 - 一种读写器与标签卡之间的动态认证方法及实现装置 - Google Patents

一种读写器与标签卡之间的动态认证方法及实现装置 Download PDF

Info

Publication number
WO2012119434A1
WO2012119434A1 PCT/CN2011/079240 CN2011079240W WO2012119434A1 WO 2012119434 A1 WO2012119434 A1 WO 2012119434A1 CN 2011079240 W CN2011079240 W CN 2011079240W WO 2012119434 A1 WO2012119434 A1 WO 2012119434A1
Authority
WO
WIPO (PCT)
Prior art keywords
reader
tag
authentication
value
tag card
Prior art date
Application number
PCT/CN2011/079240
Other languages
English (en)
French (fr)
Inventor
薛涛
杜军朝
刘惠
刘树君
贺文
陈文婧
郭江坤
邓清哲
刘传益
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US13/985,558 priority Critical patent/US9171191B2/en
Priority to EP11860464.4A priority patent/EP2667326B1/en
Publication of WO2012119434A1 publication Critical patent/WO2012119434A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10366Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present invention relates to radio frequency identification technology, and more particularly to a highly autonomous RFID reader based
  • Radio Frequency Identification is a non-contact, automatic identification technology that automatically identifies target objects and acquires relevant data via RF signals. This technology works in complex environments without manual intervention, and the significant advantage of this technology is that it does not require physical contact. At present, RFID products have been widely used in retail, automatic toll collection, animal identification, logistics, warehousing, library management and other fields.
  • the basic components of RFID include a reader, an RFID tag, and a back-end database (DB).
  • an electronic tag consists of an antenna and a tag-specific chip. Each tag has a unique electronic code attached to the target object.
  • the reader is a device that reads and writes the tag, and mainly includes a radio frequency module and a digital signal processing unit. The basic function of the reader is to provide a way to transfer data to and from the tag.
  • the back-end database is mainly used to store information. It is a database management system that contains data and authentication information for all tags in the system.
  • RFID system tagging devices have some limitations, such as limited storage space, limited computing power, etc., so designing an efficient, secure, low-cost RFID security authentication method has become a new and challenging problem.
  • the methods used to implement the RFID security mechanism mainly include two physical mechanisms and a cryptographic mechanism.
  • the physical mechanism requires the addition of more physical components and equipment, increases the cost of the label, and does not apply to low-cost RFID systems. Therefore, in the recent RFID security research, more security mechanisms based on cryptography are proposed, and based on Hash.
  • the design of the function's RFID security certification is of great concern.
  • RFID security certification based on cryptography is generally available. Divided into two categories: based on the static ID mechanism and based on the dynamic ID mechanism.
  • the so-called “static ID based mechanism” method means that the ID of the tag will not be updated during the authentication process, and remains unchanged. Generally, it is used for occasions where the security requirement is relatively low, and the forward security cannot be satisfied;
  • the “mechanism” method means that the identification information of the tag can be updated in the authentication session, so that even if the state of the current time of the tag is broken, it is impossible to speculate the state at any previous time or to associate the previously obtained state with it. It is often used to store writable tag cards and where security requirements are high, to meet forward security requirements.
  • the reader initiates an authentication request to the tag. After the tag is received, the reader returns a response packet. After the reader receives the packet, the reader receives the packet. , without any operation, directly forward the response packet to the background database, and the background database authenticates the reader and the tag according to the response packet. If the authentication is successful, the background database transmits the relevant information of the tag to the reader/writer. It is processed by the reader.
  • the main object of the present invention is to provide a dynamic authentication method and an implementation device between a reader/writer and a tag card, which are used to solve the problem that the traditional authentication method must rely on real-time online, reliable and secure connection with the background database.
  • a dynamic authentication method for a reader/writer and a tag card comprising:
  • metaID CJ Generated in the authentication database (id/ , metaID CJ , index/, Cj), issued for authorized readers ( metaID crJ , h(r ; , index/), c rj ), for tag card download ( metaID ciJ , index/, c tj ), where id is the unique identifier of the tag card T, metaID c , metaID crJ , metaID c? are respectively id/ values obtained after C and c hash operations, and index. is corresponding to the tag card
  • the index value is the unique identifier of the reader, h(r, index/) is the position value generated by the authentication database for finding the label information in the hash table of the reader, and h is a hash function;
  • the reader R calculates the value of h (metalD, ⁇ ⁇ , ⁇ ), and then judges whether the obtained value is equal to the ME. If they are equal, the reader verifies the verification of the label successfully.
  • the method further includes the step of updating:
  • the present invention further provides a method for searching for a tag card, the method comprising:
  • the method for searching for a tag card further includes:
  • the present invention further provides a radio frequency identification RFID reader/writer based on an embodiment of the present invention, the reader/writer includes:
  • the database requests to download the information of the tag card 1 ⁇ (metalD h(r ; , index/ ) , c rj ); a random number generating module for generating a random number ⁇ ⁇ ;
  • An authentication requesting module configured to send a request for carrying and I to the tag card 1 ⁇ , and receive a response message sent by the tag card carrying IN, ME, and a value;
  • a position finding module configured to calculate a value of h, ⁇ ⁇ , ⁇ ), and XOR the value to obtain an HRI value, and then find in the hash table whether there is a label information equal to the HRI value and satisfying -c rj >0, If yes, the authentication response module is notified that the authentication fails; otherwise, the notification label identifies that the authentication module searches successfully;
  • the tag identification authentication module calculates h (metalD , ⁇ ⁇ , nj values when the location search module finds success, and then determines whether the obtained value is equal to the ME. If they are equal, the authentication response module is notified that the authentication is successful, otherwise the authentication response module fails to be authenticated. ;
  • a storage module configured to store a hash table, a random number, and a reader identifier information, where the hash table stores the label information (metalD h(r ; , index/ ) , c rj )
  • the reader further includes:
  • the present invention further provides a label card, the label card comprising: a storage module, configured to store label information (metalD ⁇ ., index,,
  • a random number generating module for generating a random number n t ;
  • the reader/writer authentication module is configured to calculate h(h (metaH1 ⁇ 2), ⁇ ⁇ , ⁇ ,) when receiving the request message carrying the M value sent by the reader/writer I ⁇ , and then compare whether the obtained value is equal to ⁇ , If they are equal, the authentication of the tag card to the reader is successful, otherwise the authentication of the reader fails.
  • the tag card further includes:
  • the technical solution of the present invention has the following beneficial effects: (1) the reader does not need to maintain a connection with the background database in real time, and the authentication of the label card is not completed on the database side, and the present invention
  • the authentication database is only responsible for maintaining and providing authentication information. After the authentication information is downloaded to the legal reader and tag card, the reader and the tag card independently authenticate each other, and no longer rely on the background database to authenticate the tag card online. The user's use.
  • the present invention uses an authorized access mechanism, and only a legitimate reader can obtain the initial ID value of the corresponding tag from the authentication database, and only a legitimate reader can authenticate or update the corresponding tag.
  • the present invention also employs a two-way authentication mechanism, and only legal tags can be processed by a legitimate reader/writer; the present invention uses a one-way hash function and provides a dynamic update mechanism for the ID to ensure forward security.
  • the reader uses a hash table to store the tag information, which improves the authentication rate.
  • the data is synchronized by counting the values. The random number is used to ensure that each packet is used for different authentication. Eavesdropping attacks, spoofing attacks, etc., and can effectively hide the location information of the tag.
  • the authentication method provided by the present invention has good security features.
  • Figure 1 is a flow chart of a conventional RFID authentication method
  • FIG. 2 is a schematic diagram of a storage structure of a hash table in a reader/writer according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a dynamic ID authentication method based on a highly autonomous RFID reader/writer according to an embodiment of the present invention
  • 4 is a schematic diagram of a functional module of an RFID reader/writer according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a functional module of a tag card according to an embodiment of the present invention.
  • h(.) is a cryptographically significant digest function ⁇ 0, 1 ⁇ * ⁇ 0, 1 I 1 , where 1 is a security parameter of the RFID system, and here is the ID of the tag card of the present invention. length.
  • 1 is a security parameter of the RFID system, and here is the ID of the tag card of the present invention. length.
  • FIG. 3 is a flow chart of steps of a dynamic ID authentication method based on a highly autonomous RFID reader provided by an embodiment of the present invention, and the detailed steps are as follows:
  • the initial value of c is set to 1, that is, the initial Index/ is the index value corresponding to the tag card. This value is used to quickly search the information of the corresponding tag card in the storage module of the reader.
  • the value is a privacy value and is only stored in the authentication database and the tag card. Writer hidden;
  • metaID c? is the value obtained after the id has been c3 ⁇ 4 times hashed, and passed in the subsequent verification process.
  • a random number generating module is provided, and the random number n t is independently generated by the tag card.
  • each reader is assigned a unique identification value r.
  • the authentication database is authorized to I and the information (metalD h (r ; , index, ), c rj ) is stored in a hash table for storing tag information in the reader/writer.
  • h(3 ⁇ 4, index/ ) is a value calculated by the authentication database at the time of authorization. It is not an expression. This value can be understood as the location identification information of the tag card information stored in the reader.
  • c i; initialized to 0, metalD ⁇ . indicates that the id of the label passes c i; the result value after the second hash operation, when Ci; initialized to 0, correspondingly metalDcf id ⁇
  • any one of the readers is always less than or equal to the tag card, otherwise the reader considers that the tag is illegal.
  • the purpose of the present invention is to store h, index/) as the storage location identifier of the tag information, by hashing the unique identifier of the reader and the unique identifier of the tag card index/, hiding the index. and making the same
  • the information of the tag card is different in the storage address of the different readers; in a preferred embodiment of the present invention, the data structure as shown in FIG. 2 is established to store the tag information, and the hash table is maximized by h(3 ⁇ 4 , index/ )
  • the storage space number maxL is used to determine the position value of the tag information in the hash table, and all the tag information with the same h(3 ⁇ 4, index, )% maxL value is stored by the linear linked list.
  • the reader/writer includes a pseudo random number generator for generating I, and a Hash function module identical to the Hash function module in the tag card for performing a peer-to-peer hash operation.
  • the reader can also set up a separate random number generation module for generating ⁇ .
  • Step S401 the reader/writer generates a random number I, and then sends a request to the tag card 1 ⁇ , where the request carries the identifier value I ⁇ of the reader/writer R and the random number ⁇ ⁇ generated by the reader/writer;
  • ME h ( metaID ciJ , n r , n t ),
  • the tag card feeds back to the reader (IN, ME, c tj , n t );
  • the reader sends an authentication request to the tag card to include a random number I, and the tag is received.
  • a pseudo random number is generated by calling a hash function according to the random number delivered by the authentication database.
  • Two random numbers guarantee that the data transmitted between the reader and the tag is different each time.
  • there is no random number generator in the actual tag card there is no random number generator in the actual tag card, and the random number generated by the tag is a pseudo-random number.
  • the tag card can also be provided with a random number generating module for independently generating a random number to Provide better security.
  • a random number is written into the label card, and the subsequent random number is a pseudo random number calculated according to a hash function.
  • Step S403 The reader receives the response of the tag, and first parses the data packet to obtain IN, ME, and n respectively. Then, using the r and n r of the local end and the received n to calculate h (r, n r , n t ), and using the obtained value to XOR with the IN, the value of h (rrada index, ) calculated by the tag card is obtained, that is, step S402 In the HRI, then use h (r, index, ) % maxL to get the address in the hash table of the corresponding label, and use h ( r t , index/) to compare with the h_index_r value of each node in the linear table. H_index_i ⁇ is the h, index, ) that the reader has downloaded from the database.
  • Step S404 if the step S403 finds a node equal to h (rcken index, ) in the hash table, and .-(3 ⁇ 4 ⁇ 0, the label position search succeeds, and then step S405 is performed; otherwise, the reader/writer pairs the label If the authentication fails, skip to step 410.
  • metalD ⁇ . and Ci . are known values, and the reader obtains zero by hashing the number of c3 ⁇ 4 -c rj differences.
  • Step S406 the reader/writer calculates h (metalD , ⁇ ⁇ , ⁇ ⁇ ), and determines whether the obtained value is equal to the ME. If they are equal, the reader verifies that the label is successfully verified, and the reader considers that the label is legal. Then, step S407 is performed; otherwise, the reader/writer authentication fails, and step S409 is performed;
  • Step S408 The reader/writer calculates M by the following method, and sends the M to the tag card for the tag to authenticate the reader, and then executes S411;
  • Step S409 when the reader/writer fails to authenticate the label in step 406, the reader/writer sends an authentication failure packet to the label;
  • Step S410 If the tag location search fails in step 404, the present invention considers that the authentication fails, and the tag may be fake at this time, or the tag is not a tag authorized by the reader, and the reader sends an authentication failure packet to the tag;
  • Step S411 After receiving the response of the reader/writer, the tag parses the data. If the response packet of the authentication failure, the tag stops calculating; if it is not the response packet of the authentication failure, the obtained data M is parsed, and h(h (metalD) is calculated. ⁇ . ), ⁇ ⁇ , ⁇ ) , to determine whether the result is equal to ⁇ , if equal, the tag card successfully authenticates the reader.
  • a dynamic ID authentication method based on a highly autonomous RFID reader/writer is provided.
  • the present invention also provides a method for searching a tag card by using the reader/writer provided by the present invention. In many cases, it is necessary to search for a certain number of tags. a label. If only the identification of each tag is verified by the authentication method of the present invention, it is apparent that the tag required by the system is inefficient and impractical. Therefore, the present invention proposes a search method based on the authentication method.
  • the purpose of the search is to allow the authorized reader to find a tag that is authorized to access in many tags, and the corresponding tag can respond to the reader. In the ideal state, only this tag will respond and pass its message to the authorized reader.
  • Step 501 the card reader to the tag broadcasts IN, r, ⁇ ⁇ ;
  • Step 502 After the tag card receives the broadcast of the reader/writer, each tag card calculates [h ( h , ownindex ), n r ) ] m and compares it with the IN value. If the two are equal, step 503 is performed. Otherwise Do not respond; ownindex is used to identify the index value of each tag card;
  • the method of the present invention further includes the following steps of system maintenance: the authentication database is responsible for generating, installing, and deploying tags, generating a unique id value and a digest value index for the tag card, and generating a unique system for the reader/writer.
  • FIG. 4 is a schematic diagram of an authentication method provided by an embodiment of the present invention.
  • a schematic diagram of the functional modules of the RFID reader/writer, the reader/writer 400 includes the following functional modules:
  • Obtaining a label information module 401 configured to authenticate the validity of the database to the reader and the information requested to download the label card 1 ⁇ to the authentication database (metalD ⁇ ., h(r ;, index/), c rj );
  • the random number generating module 402 is configured to generate a random number I;
  • the authentication request module 403 is configured to send a request carrying the ⁇ and I to the tag card 1 ⁇ , and receive a response message carrying the IN, ME, and the value sent by the tag card;
  • the location finding module 404 is configured to calculate a value of h, ⁇ ⁇ , ⁇ , ), and XOR the IN to obtain an HRI value, and then find in the hash table whether there is an equal HRI value and the condition -c rj >0 is satisfied.
  • the label information if yes, notifies the authentication response module that the authentication fails; otherwise, the notification label identifies that the authentication module searches successfully;
  • the tag identification authentication module 405 calculates the value of h (metalD, ⁇ ⁇ , ⁇ ) when the location search module searches for success, and then determines whether the obtained value is equal to the ME. If they are equal, the authentication response module is notified that the authentication is successful, otherwise the authentication response module is notified. Authentication failed;
  • the authentication response module 406 is configured to send an authentication failure message to the tag card, or send the bearer
  • the storage module 407 is configured to store a hash table, a random number, and a reader identifier information, where the hash table stores the label information delivered by the authentication database (metalD ⁇ ., h(r ; , index/ ), c rj ) radical
  • FIG. 5 is a label card for implementing the authentication method provided by the present invention according to an embodiment of the present invention.
  • the tag card 500 includes the following functional modules:
  • a storage module 501 configured to store tag information (metaID c? / , index /, c tj ) downloaded from the authentication database;
  • the reader/writer authentication module 504 is configured to calculate h(h (metalD ⁇ .), n r , n t ) when receiving the request message carrying the M value sent by the reader/writer I ⁇ , and then compare whether the obtained value is M is equal. If they are equal, the label card is successfully authenticated by the reader. Otherwise, the authentication of the reader fails.
  • the tag ID uses a dynamic update mechanism to ensure forward security.
  • the reader uses a hash table to store tag card information, which improves the authentication rate.
  • the data is synchronized by counting the values; using random numbers to ensure Each time you use a different data packet, you can effectively hide the location information of the tag and provide good security features.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Toxicology (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Storage Device Security (AREA)
  • Near-Field Transmission Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明公开了一种读写器与标签卡之间的动态认证方法及实现装置,用于解决传统认证方法必须依赖于与后台数据库的实时在线、可靠安全地连接,无法高度自治地由读写器对标签卡进行认证的技术问题。本发明中只有合法的读写器才能从认证数据库中获取对应标签认证信息,才能认证或者更新相应的标签的状态;只有合法的标签才可以被合法的读写器处理;认证过程中标签ID采用动态更新机制,保证了前向安全性,读写器采用哈希表存储标签卡信息,提高了认证速率;通过计数值的方式巧妙实现数据同步;使用随机数,保证每次认证时,都使用不同的数据包,有效的隐藏标签的位置信息,提供了很好的安全特性。

Description

一种读写器与标签卡之间的动态认证方法及实现装置 技术领域
本发明涉及到射频识别技术,尤其涉及一种基于高度自治 RFID读写器
背景技术
射频识别 (RFID )是一种非接触式的自动识别技术, 它通过射频信号 自动识别目标对象并获取相关数据。 该技术无需人工干预, 可在复杂的环 境中工作, 且该技术的显著优点是不需要物理上接触。 目前, RFID产品已 被广泛应用于零售, 自动收费, 动物识别, 物流, 仓储, 图书馆管理等领 域。
RFID基本组成包括读写器( reader ), RFID标签( tag ) 以及后台数据 库(DB )。 一般情况下, 电子标签是由天线和标签专用芯片组成。 每个标签 有唯一的电子编码, 附在目标对象上。 读写器是对标签进行读写操作的设 备, 主要包括射频模块和数字信号处理单元两部分。 读写器的基本功能就 是提供与标签进行数据传输的途径。 后台数据库主要是存储信息, 是一个 数据库管理系统, 包含了系统中所有标签的数据和认证信息。
RFID系统的标签设备具有一些局限性, 例如有限的存储空间、 有限的 计算能力等等, 所以设计高效、 安全、 低成本的 RFID安全认证方法成为了 一个新的具有挑战性的问题。目前实现 RFID安全性机制所釆用的方法主要 有物理机制和密码机制两种。 物理机制, 需要附加较多的物理元件和设备, 增加标签的成本, 不适用低成本标签的 RFID系统, 所以在最近的 RFID安 全研究中提出较多的是基于密码技术的安全机制,而基于 Hash函数的 RFID 安全认证的设计更是备受关注。目前基于密码技术的 RFID安全认证大致可 以分为两类:基于静态 ID机制的和基于动态 ID机制的。所谓"基于静态 ID 机制"方法是指标签的 ID在认证过程中不会进行更新, 一直保持不变, 一 般用于安全需求相对较低的场合, 不能满足前向安全性; 而"基于动态 ID 机制 "方法是指标签的标识信息在认证会话中可以进行更新, 这样即使攻破 标签的当前时刻的状态, 也无法推测之前任意时刻的状态或者将之前获得 的状态与之关联起来。 常用于存储可写的标签卡、 安全需求较高的场合, 能够满足前向安全性需求。
在传统的认证方法中, 其认证方法基本模型如图 1 所示, 首先读写器 向标签发起认证请求, 标签接收到后, 给读写器返回一个响应包, 读写器 接受到这个包后, 不进行任何操作, 直接将响应数据包转传给后台数据库, 由后台数据库根据响应包对读写器和标签进行认证, 若认证成功, 则后台 数据库将标签的相关信息传给读写器, 由读写器做相应处理。
传统方法的一个重要的缺点是它有很强的可靠性假设, 它要求读写器 与后台数据库之间时时保持连接, 并认为读写器与后台数据库之间的连接 是安全的。 也就是说如果读写器与后台数据库之间不能连接, 则不能进行 认证, 也就不能够进行相应的操作处理。 但是在现实生活中, 读写器与后 台数据库之间的信道不能达到真正的安全,并且随着 RFID技术在移动设备 上的广泛应用, 就不能保证读写器与后台数据库之间的实时连接。 还有保 持实时的链接费用也会很高, 阻碍了这种技术的广泛应用。 发明内容
有鉴于此, 本发明的主要目的在于提供一种读写器与标签卡之间的动 态认证方法及实现装置, 用于解决传统认证方法必须依赖于与后台数据库 的实时在线、 可靠安全地连接, 无法高度自治地由读写器对标签卡进行认 证的技术问题。
为达到上述目的, 本发明的技术方案是这样实现的: 一种读写器与标签卡的动态认证方法, 该方法包括:
在认证数据库中生成(id/ , metaIDCJ , index/, Cj), 为授权的读写器下 发 ( metaIDcrJ, h(r;, index/), crj ), 为标签卡下载 ( metaIDciJ, index/, ctj ), 其中 id为标签卡 T的唯一标识, metaIDc、 metaIDcrJ, metaIDc?分别为 id/ 经过 C、 c 次哈希运算后所得值, index.为与标签卡对应的索引值, 为 读写器 的唯一标识, h(r, index/)为认证数据库生成的用于在读写器的哈 希表 中查找标签信息的位置值, h为哈希函数;
读写器 R生成随机数 I , 然后向标签卡 1}发送携带 r和 I 的请求; 标签卡 T /生成随机数 并计算 HRI=h (r, index/), IN=h (r;, nr, nt) ® HRI, ME=h ( metaIDciJ, nr, nr), 然后向读写器 反馈 IN、 ME、 和 nr; 读写器 计算 h (r, ηΓ, n ) 的值, 并与 IN异或得到 HRI值, 然后在 哈希表中查找是否存在与 HRI值相等的标签信息, 若存在且满足条件 .-c . >0, 则计算 metaID= h。tj—。Ij( metaID。), 否则对标签卡的验证失败;
读写器 R计算 h (metalD, ηΓ, η )值, 然后判断所得值与 ME是否相 等, 若相等, 则读写器对标签的验证成功。
进一步地, 所述方法还包括如下标签卡 1}对读写器 的认证步骤: 读写器 计算 M=h(h (metalD), ηΓ, η)值, 并将 Μ值发送给标签卡; 标签卡1}收到 Μ后, 计算 h(h (metalD^.), ηΓ, ηΓ), 然后比较所得值是 否与 Μ相等, 若相等, 则标签卡对读写器的认证成功, 否则对读写器的认 证失败。
进一步地, 所述方法还包括更新的步骤:
在读写器 对标签卡 Τ人证成功后, 执行 metaIDc? =metaID, crj =c^的赋 值操作;
在标签卡 T对读写器 R认证成功后,执行 metaIDc?=h( metaIDciJ ), ctj=ctJ+l 的操作。 进一步地,读写器 在获得 HRI值后,在哈希表中查找是否存在与 HRI 值相等的标签信息的方法为:
计算 h (r, index, ) % maxL求余得到对应标签所在哈希表中的地址, 然后在该地址对应的线性链表中查找节点值与 h (r„ index, )相等的节点, 若找到则表示存在与 HRI值相等的标签信息, 否则表示不存在与 HRI值相 等的标签信息。
基于本发明实施例, 本发明还提供一种搜索标签卡的方法, 该方法包 括:
读写器 向多个标签卡广播 IN、 nr, IN=[h (h(r;, index, ), nr) ]m, 其中, 为读写器的唯一标识, i 为读写器生成的随机数, index为所要查 找的标签卡 1}的唯一索引, [^表示取所得哈希值的前 m位;
标签卡接收到广播后, 每个标签卡计算 [h (h (r,-, ownindex), nr) ]m 并与 IN值做比较, 若二者不相等, 则不做响应, 否则标签卡生成伪随机数 nt , 计算 TM=h ( metaIDc?/, nr, nt), 及 TC=h(r nr, nt) ® ctj , 然后将 TM、 TC及 反馈给读写器;
读写器 通过反异或得到 ., 然后计算 metaID=h。tj (metaID ) , 及 h
(metalD, ηΓ, ηΓ), 并将所得值与接收的 ΤΜ 比对, 若二者相等, 则表示 读写器 查找标签卡 1}成功, 否则查找失败。
进一步地, 所述搜索标签卡的方法还包括:
在查找成功时, 读写器 Rr¾行 metalD^. =metaID , crj =ctj的赋值操作; 读写器 发送查找成功信息给标签卡 1 标签卡 1}对读写器 认证成功 后, 执行 metaIDc?=h ( metaIDc? ), 1的操作。
基于本发明实施例, 本发明还提供一种射频识别 RFID读写器, 该读写 器包括:
获取标签信息模块,用于认证数据库对读写器 的合法性认证及向认证 数据库请求下载标签卡 1}的信息 (metalD h(r; , index/ ) , crj ); 随机数生成模块, 用于生成随机数 ηΓ;
认证请求模块,用于向标签卡 1}发送携带 和 I 的请求, 以及接收标签 卡发送的携带 IN、 ME、 和 值的响应消息;
位置查找模块, 用于计算 h , ηΓ, η ) 的值, 并与 IN异或得到 HRI 值, 然后在哈希表中查找是否存在与 HRI值相等且满足 -crj >0的标签信 息, 若存在, 则通知认证响应模块认证失败; 否则通知标签标识认证模块 查找成功;
标签标识认证模块, 在位置查找模块查找成功时计算 h ( metalD , ηΓ, nj值, 然后判断所得值与 ME是否相等, 若相等, 则通知认证响应模块认 证成功, 否则通知认证响应模块认证失败;
认证响应模块, 用于向标签卡发送认证失败信息, 或发送携带 M=h(h ( metalD ), ηΓ, η值的认证成功信息;
存储模块, 用于存储哈希表、 随机数、 读写器标识信息, 所述哈希表 中存储认证数据库下发的标签信息 (metalD h(r; , index/ ) , crj )„
进一步地, 该读写器还包括:
更新模块, 用于在读写器 对标签卡 T /认证成功后, 执行 metalD^. =metaID , crj =ctj的赋值操作。
基于本发明实施例, 本发明还提供一种标签卡, 该标签卡包括: 存储模块, 用于存储从认证数据库下载的标签信息(metalD^., index,,
¾· );
随机数生成模块, 用于生成随机数 nt;
认证响应模块, 用于接收读写器 发送的携带 和 I 的请求, 并计算 HRI=h ( r; , index/ ), IN=h ( r; , nr, nt ) ® HRI, ME=h ( metaIDciJ, nr, n , 然后向读写器 R反馈携带 IN、 ME、 c¾和 1¾值的响应消息; 读写器认证模块, 用于在接收到读写器 I ^发送的携带 M值的请求消息 时, 计算 h(h ( metaH½ ), ηΓ, η,) , 然后比较所得值是否与 Μ相等, 若相等, 则标签卡对读写器的认证成功, 否则对读写器的认证失败。
进一步地, 该标签卡还包括:
更新模块, 用于在标签卡 Τ /对读写器 R认证成功后, 执行 metaIDrt =h ( metaIDciJ ), ctj=ctj+l的操作。
本发明技术方案与现有传统标签认证方法相比, 有以下一些有益效果: ( 1 )读写器不需要与后台数据库实时保持连接, 对标签卡的认证不在 数据库侧完成, 本发明所述的认证数据库只负责维护和提供认证信息, 在 向合法的读写器和标签卡下载了认证信息后, 由读写器和标签卡独立进行 相互认证, 不再依赖后台数据库来在线认证标签卡, 方便了用户的使用。
( 2 )从安全角度进行分析, 本发明釆用授权访问机制, 只有合法的读 写器才能从认证数据库中获取对应标签的初始 ID值, 也只有合法的读写器 才能认证或者更新相应的标签的状态; 本发明还釆用双向认证机制, 只有 合法的标签才可以被合法的读写器处理; 本发明釆用单向 hash函数, 并提 供了 ID的动态更新机制, 保证了前向安全性; 读写器釆用哈希表存储标签 卡信息, 提高了认证速率; 通过计数值的方式巧妙实现数据同步; 使用随 机数, 保证每次认证时, 都使用不同的数据包, 能够很好防止窃听攻击、 假冒攻击等等, 并且可以有效的隐藏标签的位置信息。 根据分析得知, 本 发明提供的认证方法具有很好的安全特性。 附图说明
图 1为传统的 RFID认证方法流程图;
图 2为本发明实施例读写器中的哈希表的存储结构示意图;
图 3为本发明实施例提供的基于高度自治 RFID读写器的动态 ID认证 方法流程图; 图 4为本发明实施例提供的 RFID读写器的功能模块组成示意图; 图 5为本发明实施例提供的标签卡的功能模块组成示意图。 具体实施方式
为使本发明的目的、 技术方案和优点更加清楚明白, 以下举实施例并 参照附图, 对本发明进一步详细说明。
本发明实施例中的 h(.)为密码学意义上的摘要函数 {0,1}*→{0, 1 I1,其中 1为 RFID系统的安全参数,此处为本发明标签卡的 ID的长度。假设系统中 有 m个读写器 R , l< <m, 和 n个标签卡 Ί 1< <η, 其中 m,n为大于等于 1的正整数;
图 3为本发明实施例提供的基于高度自治 RFID读写器的动态 ID认证 方法的步骤流程图, 详细步骤如下:
步骤 S400、 进行认证数据库、 读写器 和标签卡1}的初始化, 在认证 数据库中生成( id/ , metaIDCJ , index/, Cj= l ),为授权的读写器下发( metaIDcrJ= id/, h(r;, index/ ), crJ=0 ), 为标签卡下载 ( metaIDciJ, index/, ctj= 1 , nt ); 当标签卡 1}加入系统使用时, 认证数据库初始化生成并存储标签卡 1} 的信息( id/ , metaIDCJ , index/, C ),其中 id为标签卡 T的唯一标识, metaIDCJ. 为 id经过 c次哈希运算后所得到值, 本发明实施例中设 c的初始值为 1 , 即初始
Figure imgf000009_0001
index/为与标签卡对应的索引值, 该值用于在读写 器的存储模块中快速的搜索对应标签卡的信息, 该值为一个隐私值, 只在 认证数据库和标签卡存储, 对读写器隐藏;
初始情况下,在标签卡 1}中存储( metaIDc? , index/, ctj, nt ),其中 metaIDc? 为 id经过 c¾次哈希运算后所得到值, 在以后的验证过程中通过 hash函数 用类似于 Hash链的方法更新标签卡中的 metalD^.值; 本发明实施例中初始 情况下 c¾ =l ; nt是一个随机数, 该实施例中由认证数据库下发 nt, 用于在认 证过程中由标签卡产生伪随机数, 为了提供更好的安全性, 也可在标签卡 中提供随机数生成模块, 由标签卡独立生成随机数 nt
初始情况下, 每个读写器 都分配有一个唯一的标识值 r, 当合法读 写器 向认证数据库申请对标签卡 1}的访问许可时, 认证数据库向 I 受权, 并将信息 (metalD h(r;, index, ), crj )存储到读写器中用于存储标签信 息的哈希表中。 特别注意的是 h(¾, index/ )是一个由认证数据库在授权时计 算好的值, 并非是一个式子, 该值可以理解为标签卡信息存储在读写器中 的位置标识信息。 ci;初始化为 0, metalD^.表示标签的 id经过 ci;次哈希运算 后的结果值, 当 Ci;初始化为 0时, 相应地 metalDcf id^
本发明实施例中, 在初始化时及以后的动态认证过程中, 任何一个读 写器的 始终小于等于标签卡的 ·, 否则读写器认为标签是不合法的。
本发明将 h , index/ )作为标签信息的存储位置标识的目的在于, 通过 哈希运算将读写器的唯一标识 和标签卡的唯一标识 index/ 关联起来,隐藏 了 index., 并使得同一个标签卡的信息在不同的读写器中存储地址不同; 在本发明一优选实施例中, 建立如图 2 的数据结构来存储标签信息, 通过 h(¾ , index/ )对哈希表 的最大存储空间个数 maxL取余的方式确定标 签信息在哈希表中的位置值, 通过线性链表来存储 h(¾, index, )% maxL值 相同的所有标签信息。
本发明实施例中, 读写器包含一个伪随机数发生器用于生成 I , 还包 含一个与标签卡中 Hash函数模块相同的 Hash函数模块用于执行对等的哈 希运算。 为了提供更好的安全性, 读写器也可设置一个独立的随机数生成 模块, 用于生成 ι 。
步骤 S401、 读写器 生成随机数 I , 然后向标签卡1}发送请求, 请求 中携带有读写器 R的标识值 I ^和读写器生成的随机数 ηΓ;
步骤 S402、 标签卡收到认证请求后, 标签卡1}先利用 hash函数计算出 一个新的伪随机数 n =h ( η ), 并将新的值保存, 然后利用读写器发送的 ^ 和本地保存的 index计算:
HRI=h ( r;-, index/),
IN=h (r;-, nr, nt) ® HRI
ME=h ( metaIDciJ, nr, nt ),
在获得上述计算结果后, 标签卡向读写器反馈(IN, ME, ctj, nt ); 在上述步骤中, 读写器向标签卡发出认证请求中包含一个随机数 I , 标签收到一个认证请求后, 根据认证数据库下发的随机数通过调用哈希函 数生成一个伪随机数 。 两个随机数保证每次读写器与标签之间的传输的 数据都是不同的。 为了降低标签卡的成本, 在实际标签卡中没有随机数发 生器, 标签生成的随机数是一个伪随机数, 当然也可为标签卡提供一个随 机数生成模块, 用于独立生成随机数, 以提供更好的安全性。 本发明实施 例中提前往标签卡中写入一个随机数, 以后的随机数是根据 hash函数计算 生成的伪随机数。
步骤 S403、 读写器收到标签的响应, 首先解析数据包分别得到 IN、 ME、 和 n 。 然后利用本端的 r和 nr及接收到的 n计算 h (r, nr, nt), 并 使用所得值与 IN异或得到标签卡计算的 h (r„ index, )值, 即步骤 S402 中的 HRI, 然后再用 h (r, index, ) % maxL求余得到对应标签所在哈希表 中的地址, 用 h ( rt, index/) 与线性表中每个节点的 h_index_r值比较, h_index_i^^是读写器从数据库中下载的 h , index, )„
步骤 S404、 如果步骤 S403在哈希表中找到与 h ( r„ index, )相等的节 点, 并且 .-(¾≥0, 则标签位置查找成功, 然后执行步骤 S405; 否则读写器 对标签的认证失败, 跳至步骤 410。
步骤 S405、 读写器根据 c¾推算标签的当前 metalD值, 计算方法如下: metalD = hCtjCrj( metalD .)
metalD^.和 Ci.为已知值,读写器通过 c¾ -crj差值次数的哈希运算获得零 时的 metalD值;
步骤 S406、 读写器计算 h ( metalD , ηΓ, ηΓ ), 并判断所得值与 ME是 否相等, 若相等, 则读写器对标签的验证成功, 此时读写器认为标签是合 法的, 然后执行步骤 S407 ; 否则读写器认证失败, 执行步骤 S409 ;
步骤 S407、 当步骤 S406认证成功后, 该步更新读写器中的数据, 更新 为当前认证时标签的 metaIDc? ^ctj <i , 即执行 metaIDc? =metaID , 的 赋值操作;
步骤 S408、读写器通过如下方法计算 M , 并将 M发送给标签卡, 用于 标签对读写器的认证, 然后执行 S411 ;
M=h(h ( metalD ), nr, nt)
步骤 S409、 当步骤 406读写器对标签认证失败时, 读写器向标签发送 认证失败信息包;
步骤 S410、在步骤 404中标签位置查找失败, 则本发明认为认证失败, 此时标签可能是假的, 或者该标签不是阅读器授权认证的标签, 读写器向 标签发送认证失败信息包;
步骤 S411、 标签收到读写器的响应后, 解析数据, 若是认证失败的响 应包, 则标签停止计算; 若不是认证失败的响应包, 则解析得到的数据 M , 并计算 h(h ( metalD^. ), ηΓ, η ) , 判断所得结果是否等于 Μ , 若相等, 则标 签卡对读写器认证成功。
步骤 S412、 若步骤 411中认证成功后, 标签卡同样更新数据, metaIDciJ 做一次哈希运算, 自增力。 1 , 即执行 metaIDciJ.=h ( metaIDciJ. ), 1„ 本发明实施例步骤 S407和步骤 S412为读写器和标签卡分别进行更新 的步骤, 更新信息是读写器和标签各自更新自己的信息, 并没有互传其中 的信息, 保证信息的安全。 而且本发明允许即使在合法认证时出现认证失 败的情况, 有部分信息更新, 导致读写器与标签之间没有同时更新信息, 该合法的读写器与标签之间依然能够在下一次认证中相互认证, 而不需要 同时存储新旧密码。 基于本发明提供基于高度自治 RFID读写器的动态 ID认证方法, 本发 明还提出一种使用本发明提供的读写器对标签卡进行搜索的方法, 很多时 候, 需要从很多个标签中寻找某一个标签。 如果只是用本发明的认证方法 对每个标签验证, 从其中找到系统需要的标签, 显然效率很差, 不实用。 因此本发明在认证方法的基础上提出了搜索 (Search )方法。
搜索的目的是让授权读写器在许多标签中找到授权访问的一个标签, 相应标签能够回应读写器。 理想的状态时, 只有这个标签会做出响应, 并 将自己的信息传送给授权读写器。 对于读写器 R , 直观的方法是 I ^向所有标 签广播请求 id/, 当某个标签1}自己的 ID满足 ownid==id条件时, 向阅读器 返回应答信息。
这种简单的方法不能提供任何的安全保障, 极易被窃听、 仿冒, 这样 的广播方法尤其不能很好的抵御跟踪攻击。 攻击者首先可以窃听读写器的 广播包, 然后用这个包频繁的访问标签, 因为只有正确合法的标签才会做 出响应, 所以响应包可能会暴露标签的位置信息。 因此, 在本发明的认证 方法的基础上提出了如下的安全搜索方法:
步骤 501、 读写器向标签卡广播 IN、 r、 ηΓ;
其中, IN =[ h ( h(r;, index/ ), nr ) ]m, 即 IN为 h ( h ( index/ ), nr ) 哈希值的前 m位; 只发送前 m位的原因是: 缩小匹配的精度, 在多个标签 卡中, 可能存在标签计算结果是一样的多个卡, 所以往往会有多个标签对 广播做出响应, 可以在很大程度上防止跟踪攻击; 为读写器! ^的唯一标 识, I 为读写器 生成的随机数。
步骤 502、 标签卡接收到读写器的广播后, 每个标签卡计算 [h ( h ( r , ownindex ), nr ) ]m并与 IN值做比较, 若二者相等, 则执行步骤 503 , 否则 不做响应; ownindex用于标识各标签卡自己的索引值;
步骤 503、 标签卡生成伪随机数 η , 计算 TM=h ( metalD^., ηΓ, ηΓ ), 以及计算 TC=h(¾, ηΓ, ηΓ) ® ctj , 然后将 ΤΜ、 TC及 反馈给读写器;
步骤 504、 当读写器接收到标签卡发送的反馈信息后, 先计算 h(r , ηΓ, η 然后与 TC异或后得到 , 计算当前 metaID= hCtj- ( metalD^) , 然后计算 h
( metalD, nr, nr ), 并将所得值与接收的数据 h ( metaIDc?/, nr, ηΓ ) 比对, 若二者相等, 则表示读写器找到了所需的标签卡 Τ 否则表示查找失败。 查 找成功后, 读写器还要再发送查找成功信息, 以便标签进行数据更新, 这 些步骤就与之前认证方法的过程相同 (参考步骤 401至步骤 412 )。 可以看 出, 搜索方法是基于本发明之前提出的认证方法, 所以仍属于本发明的技 术方案的保护范围内。
除上述步骤外, 本发明所述方法还包括以下系统维护的步骤: 认证数 据库负责生成、 安装、 部署标签, 为标签卡生成系统内唯一 id值和摘要值 index, 为读写器生成系统内唯一的标识 r值, 管理系统中读写器和标签的 数据以及认证信息, 并可以将这些数据下载到合法的读写器标签中。
本发明使用的环境是假设多个读写器对同一个标签都有合法的操作权 限。 例如在行李自动识别系统中, 本发明希望行李所在机场的工作人员授 权的读写器能够对行李识别并确认其中信息, 同时假设了旅客的手机中包 含有一个 RFID读写器,这样行李的主人可以通过自己的手机对行李进行搜 索、 识别以及确认其中信息。 因为有多个读写器都能对行李识别, 所以本 发明将标签的 ID值设计为动态变化的。 本发明中的方法可分为两部分, 认 证方法和更新方法。 但是由于在行李识别系统中, 对一个标签的认证不会 过于频繁, 因此在行李系统中可选择在每次认证成功都对数据进行更新。 图 4 为本发明实施例提供的一种用于实现本发明提供的认证方法的 RFID读写器的功能模块组成结构示意图, 该读写器 400 包括以下功能模 块:
获取标签信息模块 401 , 用于认证数据库对读写器 的合法性认证及向 认证数据库请求下载标签卡 1}的信息 (metalD^., h(r;, index/ ), crj );
随机数生成模块 402 , 用于生成随机数 I ;
认证请求模块 403 , 用于向标签卡1}发送携带 ^和 I 的请求, 以及接收 标签卡发送的携带 IN、 ME、 和 值的响应消息;
位置查找模块 404, 用于计算 h , ηΓ, η, ) 的值, 并与 IN异或得到 HRI值, 然后在哈希表中查找是否存在与 HRI值相等且满足条件 -crj >0 的标签信息, 若存在, 则通知认证响应模块认证失败; 否则通知标签标识 认证模块查找成功;
标签标识认证模块 405 , 在位置查找模块查找成功时计算 h ( metalD, ηΓ, η )值, 然后判断所得值与 ME是否相等, 若相等, 则通知认证响应模 块认证成功, 否则通知认证响应模块认证失败;
认证响应模块 406 , 用于向标签卡发送认证失败信息, 或发送携带
M=h(h ( metalD ), ηΓ, η )值的认证成功信息;
存储模块 407 , 用于存储哈希表、 随机数、 读写器标识信息, 所述哈希 表中存储认证数据库下发的标签信息 (metalD^., h(r;, index/ ), crj )„
更新模块 408 , 用于在读写器 对标签卡 T /认证成功后, 执行 metalD^. =metaID, cr =c^的赋值操作。
图 5 为本发明实施例提供的一种用于实现本发明提供的认证方法的标 签卡, 该标签卡 500包括以下功能模块:
存储模块 501 , 用于存储从认证数据库下载的标签信息 (metaIDc?/, index/, ctj );
随机数生成模块 502 , 用于生成随机数 η ; 认证响应模块 503 , 用于接收读写器 发送的携带 和 I 的请求, 并计 HRI=h (r;, index/), IN=h (r;, nr, nt) ® HRI, ME=h ( metaIDciJ, nr, nt), 然后向读写器 I ^反馈携带 IN、 ME、 c¾和 值的响应消息;
读写器认证模块 504, 用于在接收到读写器 I ^发送的携带 M值的请求 消息时, 计算 h(h (metalD^.), nr, nt), 然后比较所得值是否与 M相等, 若 相等, 则标签卡对读写器的认证成功, 否则对读写器的认证失败。
更新模块 505,用于在标签卡 T /对读写器 R认证成功后,执行 metaIDrt=h ( metaIDciJ ), <¾.=(¾+ 1的操作。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。 工业实用性
本发明提供的技术方案中, 只有合法的读写器才能从认证数据库中获 取对应标签认证信息, 才能认证或者更新相应的标签的状态; 只有合法的 标签才可以被合法的读写器处理; 认证过程中标签 ID釆用动态更新机制, 保证了前向安全性, 读写器釆用哈希表存储标签卡信息, 提高了认证速率; 通过计数值的方式巧妙实现数据同步; 使用随机数, 保证每次认证时, 都 使用不同的数据包, 有效的隐藏标签的位置信息, 提供了很好的安全特性。

Claims

权利要求书
1、 一种读写器与标签卡的动态认证方法, 该方法包括:
在认证数据库中生成(id/ , metaIDCJ , index/, Cj), 为授权的读写器下 发 ( metaIDcrJ, h(r;, index/), crj ), 为标签卡下载 ( metaIDciJ, index/, ctj ), 其中 id为标签卡 T的唯一标识, metalD^ metaIDcrJ, metaIDc?分别为 id/ 经过 C、 c 次哈希运算后所得值, index.为与标签卡对应的索引值, 为 读写器 的唯一标识, h(r, index/)为认证数据库生成的用于在读写器的哈 希表 中查找标签信息的位置值, h为哈希函数;
读写器 R生成随机数 I , 然后向标签卡 1}发送携带 r和 I 的请求; 标签卡 1}生成随机数 并计算 HRI=h (r, index/), IN=h (r;, nr, nt )
® HRI, ME=h ( metaIDciJ, nr, nr), 然后向读写器 R反馈 IN、 ME、 和 nr; 读写器 计算 h (r, ηΓ, n ) 的值, 并与 IN异或得到 HRI值, 然后在 哈希表中查找是否存在与 HRI值相等的标签信息, 若存在且满足条件 .-c . >0, 则计算 metalD =h。tj—。Ij( metalD .) , 否则对标签卡的验证失败;
读写器 计算 h (metalD, ηΓ, η,)值, 然后判断所得值与 ME是否相 等, 若相等, 则读写器对标签的验证成功。
2、 根据权利要求 1所述的方法, 其中, 所述方法还包括如下标签卡1} 对读写器 R的认证步骤:
读写器 计算 M=h(h (metalD), ηΓ, η)值, 并将 Μ值发送给标签卡; 标签卡1}收到 Μ后, 计算 h(h (metalD^.), ηΓ, ηΓ), 然后比较所得值是 否与 Μ相等, 若相等, 则标签卡对读写器的认证成功, 否则对读写器的认 证失败。
3、 根据权利要求 2所述的方法, 其中, 所述方法还包括更新的步骤: 在读写器 对标签卡 Τ人证成功后, 执行 metaIDc? =metaID, crj =c^的赋 值操作;
在标签卡 T对读写器 R认证成功后,执行 metaIDc? =h( metaIDciJ ), ctj=ctJ+l 的操作。
4、 根据权利要求 1所述的方法, 其中, 读写器 在获得 HRI值后, 在 哈希表中查找是否存在与 HRI值相等的标签信息的方法为:
通过 h(r , index/ )对哈希表 的最大存储空间个数 maxL取余的方式确 定对应标签信息所在哈希表中的位置值, 然后在该位置值对应的线性链表 中查找节点值与 h ( r, index/ )相等的节点, 若找到则表示存在与 HRI值相 等的标签信息, 否则表示不存在与 HRI值相等的标签信息。
5、 一种搜索标签卡的方法, 该方法包括:
读写器 向多个标签卡广播 IN、 r、 ηΓ, 其中, IN =[ h ( h(r;, index/ ), nr ) ]m, 为读写器的唯一标识, i 为读写器生成的随机数, index为所要查 找的标签卡 1}的唯一索引, [^表示取所得哈希值的前 m位;
标签卡接收到广播后, 每个标签卡计算 [h ( h ( r,-, ownindex ), nr ) ]m 并与 IN值做比较, 若二者不相等, 则不做响应, 否则标签卡生成伪随机数 nt , 计算 TM=h ( metaIDc?/, nr, nt ), 及 TC=h(r nr, nt) ® ctj , 然后将 TM、 TC及 反馈给读写器;
读写器 通过反异或得到 然后计算 metaID= h — ( metalD。q) , 及 h
( metalD, ηΓ, ηΓ ), 并将所得值与接收的 ΤΜ 比对, 若二者相等, 则表示 读写器 查找标签卡 1}成功, 否则查找失败。
6、 根据权利要求 5所述的方法, 其中, 所述方法还包括:
在查找成功时, 读写器 Rr¾行 metalD^. =metaID , crj =ctj的赋值操作; 读写器 发送查找成功信息给标签卡 1 标签卡 1}对读写器 认证成功 后, 执行 metaIDc? =h ( metaIDc? ), 1的操作。
7、 一种射频识别 RFID读写器, 该读写器包括: 获取标签信息模块,用于认证数据库对读写器 的合法性认证及向认证 数据库请求下载标签卡 1}的信息 (metalD h(r;, index/), crj );
随机数生成模块, 用于生成随机数 ηΓ;
认证请求模块,用于向标签卡 1}发送携带 和 I 的请求, 以及接收标签 卡发送的携带 IN、 ME、 和 值的响应消息;
位置查找模块, 用于计算 h , ηΓ, η ) 的值, 并与 IN异或得到 HRI 值, 然后在哈希表中查找是否存在与 HRI值相等且满足 -crj >0的标签信 息, 若存在, 则通知认证响应模块认证失败; 否则通知标签标识认证模块 查找成功;
标签标识认证模块, 在位置查找模块查找成功时计算 h (metalD, ηΓ, nj值, 然后判断所得值与 ME是否相等, 若相等, 则通知认证响应模块认 证成功, 否则通知认证响应模块认证失败;
认证响应模块, 用于向标签卡发送认证失败信息, 或发送携带 M=h(h ( metalD ), ηΓ, η值的认证成功信息;
存储模块, 用于存储哈希表、 随机数、 读写器标识信息, 所述哈希表 中存储认证数据库下发的标签信息 (metalD h(r;, index/), crj )„
8、 根据权利要求 7所述的读写器, 其中, 该读写器还包括:
更新模块, 用于在读写器 对标签卡 T /认证成功后, 执行 metalD^. =metaID , crj =ctj的赋值操作。
9、 一种标签卡, 该标签卡包括:
存储模块, 用于存储从认证数据库下载的标签信息(metalD^., index,,
¾·);
随机数生成模块, 用于生成随机数 nt;
认证响应模块, 用于接收读写器 发送的携带 和 I 的请求, 并计算 HRI=h (r;, index/), IN=h (r;, nr, nt) ® HRI, ME=h ( metaIDciJ, nr, nt), 然后向读写器 R反馈携带 IN、 ME、 c¾和 1¾值的响应消息;
读写器认证模块, 用于在接收到读写器 I ^发送的携带 M值的请求消息 时, 计算 h(h ( metaH½ ), ηΓ, η,), 然后比较所得值是否与 Μ相等, 若相等, 则标签卡对读写器的认证成功, 否则对读写器的认证失败。
10、 根据权利要求 9所述的标签卡, 其中, 该标签卡还包括: 更新模块, 用于在标签卡 Τ /对读写器 R认证成功后, 执行 metaIDrt =h ( metaIDciJ ), ctJ=ctJ+l的操作。
PCT/CN2011/079240 2011-03-07 2011-09-01 一种读写器与标签卡之间的动态认证方法及实现装置 WO2012119434A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/985,558 US9171191B2 (en) 2011-03-07 2011-09-01 Method for dynamic authentication between reader and tag, and device therefor
EP11860464.4A EP2667326B1 (en) 2011-03-07 2011-09-01 Method for dynamic authentication between reader and tag, and device therefor

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110054430.8A CN102136079B (zh) 2011-03-07 2011-03-07 一种读写器与标签卡之间的动态认证方法及实现装置
CN201110054430.8 2011-03-07

Publications (1)

Publication Number Publication Date
WO2012119434A1 true WO2012119434A1 (zh) 2012-09-13

Family

ID=44295859

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/079240 WO2012119434A1 (zh) 2011-03-07 2011-09-01 一种读写器与标签卡之间的动态认证方法及实现装置

Country Status (4)

Country Link
US (1) US9171191B2 (zh)
EP (1) EP2667326B1 (zh)
CN (1) CN102136079B (zh)
WO (1) WO2012119434A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113489722A (zh) * 2021-07-05 2021-10-08 徐州医科大学 医疗应急供应链中基于rfid的医疗系统的新型轻量级身份验证协议方法
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136079B (zh) 2011-03-07 2014-08-20 中兴通讯股份有限公司 一种读写器与标签卡之间的动态认证方法及实现装置
GB2494890B (en) * 2011-09-21 2015-09-30 Friendly Technologies Ltd Inventorying transponders
CN102509128B (zh) * 2011-09-30 2014-09-10 江苏科技大学 一种射频识别系统安全认证方法
CN102567760A (zh) * 2012-01-10 2012-07-11 广州中盈物流科讯有限公司 基于单向函数的动态口令读写控制的rfid
CN103106380B (zh) * 2013-01-11 2016-01-27 聚辰半导体(上海)有限公司 射频识别系统的保护方法
US9774576B2 (en) * 2014-03-18 2017-09-26 Em Microelectronic-Marin S.A. Authentication by use of symmetric and asymmetric cryptography
CN104486080A (zh) * 2014-12-11 2015-04-01 吉林大学 基于汽车安防系统的动态 id 和密钥更新的rfid 安全方法
CN105991607B (zh) * 2015-02-28 2019-03-05 北京天威诚信电子商务服务有限公司 一种网络访问方法和装置
WO2016188401A1 (zh) * 2015-05-25 2016-12-01 邵通 一种隐藏用户标识数据的装置、方法和系统
FR3054345B1 (fr) * 2016-07-22 2018-07-27 Tagsys Procede de communication rfid securisee
CN106372550A (zh) * 2016-08-25 2017-02-01 辽宁工业大学 一种基于Hash类函数的MH轻量级安全认证系统及方法
CN106548102A (zh) * 2016-10-24 2017-03-29 珠海南方集成电路设计服务中心 一种基于动态id的rfid验证方法和系统
CN106487495B (zh) * 2016-11-03 2019-12-20 北京石油化工学院 基于整数混沌的轻量级rfid认证方法
CN108021967B (zh) * 2017-12-05 2022-08-26 北京小米移动软件有限公司 复制智能卡的方法、装置及计算机可读存储介质
US20210248439A1 (en) * 2018-04-25 2021-08-12 Eagile Incorporated Method and apparatus for rfid authentication
US11743253B2 (en) * 2018-05-08 2023-08-29 Roche Diabetes Care, Inc. Methods and systems for bidirectional device authentication
CN109271383B (zh) * 2018-09-05 2021-01-08 广州视源电子科技股份有限公司 动态标签处理方法、装置、计算机设备和存储介质
CN109522988B (zh) * 2018-11-20 2022-02-08 王建新 产品防伪电子标签信息更新方法和系统
CN109360008B (zh) * 2018-11-20 2021-08-10 吴祥富 产品防伪认证更新方法和系统
CN109788465B (zh) * 2019-01-22 2020-04-14 西安电子科技大学 用于区块链上基于射频识别的双向身份认证方法
CN112966536A (zh) * 2021-04-20 2021-06-15 中国建设银行股份有限公司 Rfid读写器管理方法、装置、rfid读写器、电子标签及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217362A (zh) * 2007-12-29 2008-07-09 中山大学 一种基于动态随机化drntru公钥加密系统建立的rfid通信安全机制
CN101256615A (zh) * 2007-02-27 2008-09-03 中国科学院研究生院 基于稀疏树的动态密钥更新的射频识别隐私认证方法
CN102136079A (zh) * 2011-03-07 2011-07-27 中兴通讯股份有限公司 一种读写器与标签卡之间的动态认证方法及实现装置

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60120117D1 (de) * 2000-02-15 2006-07-06 Silverbrook Res Pty Ltd Vorrichtung und protokoll zum authentifizieren eines verbrauchsgegenstandes
US20050058292A1 (en) * 2003-09-11 2005-03-17 Impinj, Inc., A Delaware Corporation Secure two-way RFID communications
EP1903469B1 (en) * 2003-09-26 2017-05-17 Nippon Telegraph And Telephone Corporation Tag privacy protecting method, tag device, programs therefor and recording medium carrying such programs in storage
US20070133807A1 (en) * 2005-12-12 2007-06-14 Electronics And Telecommunications Research Institute Tag authentication apparatus and method for radio frequency identification system
US8344853B1 (en) * 2006-05-16 2013-01-01 Eigent Technologies, Llc Secure RFID system and method
US7791451B2 (en) * 2006-10-17 2010-09-07 International Business Machines Corporation Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security
CN101217361B (zh) 2008-01-14 2010-10-06 周亮 保障信息安全的方法、系统及终端
US8359480B2 (en) * 2008-12-19 2013-01-22 University Of Washington Scalable RFID systems: a privacy preserving protocol with constant-time identification
CN101847199B (zh) * 2009-03-24 2012-06-06 复旦大学 用于射频识别系统的安全认证方法
US9054881B2 (en) * 2010-05-14 2015-06-09 Electronics And Telecommunications Research Institute Radio frequency identification (RFID) tag and interrogator for supporting normal mode and secure mode, and operation method thereof
KR20120070808A (ko) * 2010-12-22 2012-07-02 한국전자통신연구원 Rfid 태그 장치 및 rfid 태그 장치를 인식하는 방법

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256615A (zh) * 2007-02-27 2008-09-03 中国科学院研究生院 基于稀疏树的动态密钥更新的射频识别隐私认证方法
CN101217362A (zh) * 2007-12-29 2008-07-09 中山大学 一种基于动态随机化drntru公钥加密系统建立的rfid通信安全机制
CN102136079A (zh) * 2011-03-07 2011-07-27 中兴通讯股份有限公司 一种读写器与标签卡之间的动态认证方法及实现装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system
CN113489722A (zh) * 2021-07-05 2021-10-08 徐州医科大学 医疗应急供应链中基于rfid的医疗系统的新型轻量级身份验证协议方法
CN113489722B (zh) * 2021-07-05 2023-03-24 徐州医科大学 医疗应急供应链中基于rfid的医疗系统的新型轻量级身份验证协议方法

Also Published As

Publication number Publication date
EP2667326B1 (en) 2018-08-08
CN102136079B (zh) 2014-08-20
US9171191B2 (en) 2015-10-27
EP2667326A4 (en) 2014-12-10
US20130335198A1 (en) 2013-12-19
EP2667326A1 (en) 2013-11-27
CN102136079A (zh) 2011-07-27

Similar Documents

Publication Publication Date Title
WO2012119434A1 (zh) 一种读写器与标签卡之间的动态认证方法及实现装置
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
KR101404673B1 (ko) Rfid태그 인증 시스템
KR101449611B1 (ko) Rfid태그 인증 시스템
US8793496B2 (en) Systems, methods, and computer program products for secure optimistic mechanisms for constrained devices
CN110190965B (zh) 一种基于哈希函数的rfid群组标签认证协议
Chen et al. An ownership transfer scheme using mobile RFIDs
Abughazalah et al. Secure improved cloud-based RFID authentication protocol
CN103795543A (zh) 一种用于rfid系统的安全双向认证方法
KR101940983B1 (ko) 멀티캐스트 그룹 내의 디바이스
CN106411505B (zh) 一种移动射频识别的双向认证方法及移动射频识别系统
JP2019517067A5 (zh)
CN110190966A (zh) 一种基于云存储的无线射频识别标签所有权转移方法
KR100737181B1 (ko) 안전한 알에프아이디 시스템을 위한 저부하 및 재동기특성을 가진 상호인증 장치 및 그 방법
US20120166801A1 (en) Mutual authentication system and method for mobile terminals
Chen et al. A secure ownership transfer protocol using EPCglobal Gen-2 RFID
Munilla et al. Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme
CN104579688A (zh) 一种基于Hash函数可同步更新密钥的RFID双向认证方法
US20210203650A1 (en) Data message authentication based on a random number
Pourpouneh et al. An improvement over a server-less rfid authentication protocol
Morshed et al. Secure ubiquitous authentication protocols for RFID systems
Huang et al. An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags
CN102750561B (zh) 一种高效的主动安全射频识别认证的方法
KR100710759B1 (ko) Rfid 인증 시스템 및 방법
Shi et al. The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11860464

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 13985558

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2011860464

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE