CN103413079A - Method for generating ID (identity card) code on basis of encryption calculation of TID (terminal identification) code and EPC (electronic product code) - Google Patents

Method for generating ID (identity card) code on basis of encryption calculation of TID (terminal identification) code and EPC (electronic product code) Download PDF

Info

Publication number
CN103413079A
CN103413079A CN2013103205653A CN201310320565A CN103413079A CN 103413079 A CN103413079 A CN 103413079A CN 2013103205653 A CN2013103205653 A CN 2013103205653A CN 201310320565 A CN201310320565 A CN 201310320565A CN 103413079 A CN103413079 A CN 103413079A
Authority
CN
China
Prior art keywords
code
epc
tid
encryption calculation
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013103205653A
Other languages
Chinese (zh)
Other versions
CN103413079B (en
Inventor
顾健科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou zhongtianli Information Technology Co.,Ltd.
Original Assignee
MASSKY Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MASSKY Inc filed Critical MASSKY Inc
Priority to CN201310320565.3A priority Critical patent/CN103413079B/en
Publication of CN103413079A publication Critical patent/CN103413079A/en
Application granted granted Critical
Publication of CN103413079B publication Critical patent/CN103413079B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method for generating an ID code on the basis of encryption calculation of a TID code and an EPC. The encryption calculation is finished in an RFID (radio frequency identification device) reader-writer, and the obtained ID code can be applied to multiple fields, for example, all systems of a security and protection system, a stored-value system and the like, which require ID confirmation. According to the method for generating the ID code on the basis of encryption calculation of the TID code and the EPC, a unique TID code in an RFID tag is taken as a secret key, one ID code is generated through encryption calculation of the EPC code, and the ID code is unique and obtained through encryption calculation. The method has the advantages that even if the EPC code and TID code of the RFID tag are intercepted by a third party or the EPC code is replicated, one ID code which is identical to the ID code obtained through encryption calculation is impossible to generate, the uniqueness of ID code comes into existence unless the TID code loses uniqueness, and the safety of a system requiring identity recognition is improved.

Description

A kind of method based on TID code and EPC code encryption calculating generation ID code
Technical field
The present invention relates to a kind of method of the ID of generation code, be specifically related to a kind of method based on TID code in the RFID electronic tag and EPC code encryption calculating generation ID code.
Background technology
Product electronic code (EPC coding) is the new generation product coding scheme that international bar code tissue is released.Product bar code originally is only the coding to product classification, and the EPC code is given a unique coding in the whole world to each single product.The coding scheme of 96 (scale-of-two) modes of EPC coding, can be endowed for 2.68 hundred million companies, can there be 1,600 ten thousand product classifications in each company, and every series products has 68,000,000,000 stand-alone product coding, figuratively can compose a unique coding for tellurian each rice.The EPC code does not need password can directly utilize the read write line read-write.If only select EPC, although the EPC code has 96bit, perhaps higher 128bit capacity, but because the EPC code is disclosed, the read write line of any EPC of meeting C1GEN2 all can be read it, or revise its content, and even copying an identical label of EPC code, this has also caused the limitation on safety to application.
The TID code is the global unique ID number be comprised of some bytes that chip manufacturer is solidificated in the ROM the inside while dispatching from the factory.The TID code does not need password directly with read write line, to read.If select the TID code, although the TID code has uniqueness, can be used for representative and the identification of identity, because TID code book body 8 byte information can't its revised context, so caused equally the limitation of application.
With the RFID electronic tag in USER district, although need password authentification when read-write, not every label all is with the USER district on the one hand; When read write line and label carried out air communication, the password of checking use was was easily intercepted and captured and is cracked by the third party on the other hand, and this has equally also reduced the safety in utilization of label as identification ID.Simultaneously, when many labels were read to the USER district, operating speed was slower, and the encryption be not suitable under intensive label condition is read.
The ultrahigh frequency RFID electronic tag, be to use the EPC code as plain code, and the TID code is as manufacturer, and the USER district is as the privately owned district that reads and writes data of user (just can complete read-write with password authentification) and the electronic tag of making.With the ultrahigh frequency RFID electronic tag, replace traditional IC-card to carry out empowerment management in security system etc. needs the field of identification, have distance sensing to read, facilitate user's characteristics.The mode of application is mainly at present: using the EPC code as unique identification, or using the USER district as unique identification, or using the TID code as unique identification, carry out ID code sign, but all have the possibility that is replicated or is intercepted and captured, thereby security of system was lost efficacy.In view of above analysis, need to carry out to the ID code occasion of identity validation, the application of RFID technology need to have special means to realize.
Summary of the invention
For solving the problems of the technologies described above, the object of the present invention is to provide a kind of ID code safety that can guarantee that rfid system provides unique, and calculate based on TID code and EPC code encryption the method that produces the ID code.
For achieving the above object, the invention provides following technical scheme: a kind of method based on TID code and EPC code encryption calculating generation ID code, this computations completes in rfid interrogator inside, it is characterized in that, the method that described computations produces the ID code comprises the following steps:
(a) rfid interrogator is to RFID electronic tag inquiry TID code and EPC code;
(b) the RFID electronic tag is replied TID code and EPC code to rfid interrogator;
(c) rfid interrogator is usingd unique code TID code as key, by computations, obtains an ID code with the EPC code;
Further, described ID code is unique.
Further, unique described ID code is sent to other application systems or equipment is used as the ID identity code.
Further, described ID code can be applicable to a plurality of security fields that need identity validation.
Adopt the beneficial effect of above technical scheme to be: utilize unique TID code as key, by the EPC code encryption is generated to ID, this ID is unique, obtains through computations.Even EPC code and TID code that such benefit is exactly this RFID electronic tag are intercepted and captured by the third party, or the EPC code is replicated, also can not produce one with the identical ID code of the ID code obtained after computations, make the uniqueness of ID code set up (unless the TID code loses uniqueness), guaranteed to need uniqueness, the security of ID code in the system of identification.
The accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the principle of work block scheme of a kind of RFID gate control system disclosed by the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making under the creative work prerequisite the every other embodiment obtained, belong to the scope of protection of the invention.
Referring to Fig. 1, as shown in legend wherein, a kind of RFID gate control system, comprise RFID electronic tag, rfid interrogator, access controller and gate inhibition topworks.Above-mentioned RFID electronic tag comprises that an antenna for signal transmission, is be used to storing EPC Ma De EPC district, be used to storing TID Ma De TID district and a USER district; Above-mentioned rfid interrogator comprises an antenna for signal transmission and a MCU; The corresponding calculation procedure of above-mentioned MCU burning;
Below introduce the job step of above-mentioned gate control system:
(a) when the close rfid interrogator antenna of RFID electronic tag, rfid interrogator is by day alignment RFID electronic tag inquiry TID code and an EPC code;
(b) the RFID electronic tag is replied TID code and EPC code to rfid interrogator;
(c) rfid interrogator be take the TID code and is key, by the EPC code encryption is generated to the ID code;
(e) the ID code generated is joined and is sent to access controller by line by rfid interrogator;
(f) access controller is identified this ID code, if confirm as effective mandate, and the access control topworks action of opening the door; If confirm as Lame delegation, the access control topworks action of not opening the door.
TID code, EPC code in above-mentioned RFID electronic tag are intercepted and captured by third party device, or the EPC code is copied by third party device, because this ID code obtains through computations by original EPC code and TID code, therefore in the situation that the third party does not know encryption computing method, therefore the third party can't obtain the corresponding ID code of this RFID electronic tag, to the intercepting and capturing of RFID electronic tag or to copy be invalid.
Adopt the beneficial effect of above technical scheme to be: utilize unique TID code as key, by the EPC code encryption is generated to the ID code, this ID code is unique.Even EPC code and TID code that such benefit is exactly this RFID electronic tag are intercepted and captured by the third party, or the EPC code is replicated, also can not produce one with the identical ID code of the ID code obtained after computations, make the uniqueness of ID code set up (unless the TID code loses uniqueness), guaranteed to need the security of the system of identification.
Be more than the description to the embodiment of the present invention, by the above-mentioned explanation to the disclosed embodiments, make professional and technical personnel in the field can realize or use the present invention.Multiple modification to these embodiment will be apparent for those skilled in the art, and General Principle as defined herein can be in the situation that do not break away from the spirit or scope of the present invention, realization in other embodiments.Therefore, the present invention will can not be restricted to these embodiment shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (4)

1. one kind is calculated based on TID code and EPC code encryption the method that produces the ID code, and this computations completes in rfid interrogator inside, it is characterized in that, the method that described computations produces the ID code comprises the following steps:
(a) rfid interrogator is to RFID electronic tag inquiry TID code and EPC code;
(b) the RFID electronic tag is replied TID code and EPC code to rfid interrogator;
(c) rfid interrogator is usingd unique code TID code as key, by cryptographic calculation, obtains an ID code with the EPC code.
2. the method based on TID code and EPC code encryption calculating generation ID code according to claim 1, is characterized in that, described ID code is unique.
3. the method based on TID code and EPC code encryption calculating generation ID code according to claim 1, is characterized in that, unique described ID code is sent to other application systems or equipment is used as the ID identity code.
4. the method based on TID code and EPC code encryption calculating generation ID code according to claim 1, is characterized in that, described ID code can be applicable to a plurality of security fields that need identity validation.
CN201310320565.3A 2013-07-29 2013-07-29 A kind of method calculating generation ID code based on TID code and EPC code encryption Active CN103413079B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310320565.3A CN103413079B (en) 2013-07-29 2013-07-29 A kind of method calculating generation ID code based on TID code and EPC code encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310320565.3A CN103413079B (en) 2013-07-29 2013-07-29 A kind of method calculating generation ID code based on TID code and EPC code encryption

Publications (2)

Publication Number Publication Date
CN103413079A true CN103413079A (en) 2013-11-27
CN103413079B CN103413079B (en) 2016-08-10

Family

ID=49606090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310320565.3A Active CN103413079B (en) 2013-07-29 2013-07-29 A kind of method calculating generation ID code based on TID code and EPC code encryption

Country Status (1)

Country Link
CN (1) CN103413079B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104198026A (en) * 2014-08-28 2014-12-10 福州科迪电子技术有限公司 Electronic scale capable of being monitored
CN104217230A (en) * 2014-08-29 2014-12-17 公安部交通管理科学研究所 Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID)
CN104660414A (en) * 2015-02-03 2015-05-27 北京安如山文化科技有限公司 Ciphertext storage method and technique in RFID
CN104932389A (en) * 2015-05-21 2015-09-23 广州市纬志电子科技有限公司 Anti-fake method and anti-fake device for central control host
CN106067121A (en) * 2016-06-15 2016-11-02 华中科技大学 A kind of product off-line false distinguishing method based on NFC technique
CN108900297A (en) * 2018-07-06 2018-11-27 北京智芯微电子科技有限公司 Using ciphertext as the method and product of the electronic identity code of underground electron marker
CN110689102A (en) * 2019-09-30 2020-01-14 上海华苑电子有限公司 Electronic tag management system
CN114239629A (en) * 2022-02-22 2022-03-25 深圳市成为信息技术有限公司 Anti-counterfeiting verification method of label, UHF handheld terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102339399A (en) * 2010-07-22 2012-02-01 上海孚恩电子科技有限公司 Anti-counterfeiting method based on RFID electronic label
CN103150655A (en) * 2013-03-25 2013-06-12 曹鹏 Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system
CN103218591A (en) * 2013-05-07 2013-07-24 南京大学 Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102339399A (en) * 2010-07-22 2012-02-01 上海孚恩电子科技有限公司 Anti-counterfeiting method based on RFID electronic label
CN103150655A (en) * 2013-03-25 2013-06-12 曹鹏 Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system
CN103218591A (en) * 2013-05-07 2013-07-24 南京大学 Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104198026A (en) * 2014-08-28 2014-12-10 福州科迪电子技术有限公司 Electronic scale capable of being monitored
CN104217230A (en) * 2014-08-29 2014-12-17 公安部交通管理科学研究所 Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID)
CN104217230B (en) * 2014-08-29 2017-03-15 公安部交通管理科学研究所 The safety certifying method of hiding ultrahigh frequency electronic tag identifier
CN104660414A (en) * 2015-02-03 2015-05-27 北京安如山文化科技有限公司 Ciphertext storage method and technique in RFID
CN104932389A (en) * 2015-05-21 2015-09-23 广州市纬志电子科技有限公司 Anti-fake method and anti-fake device for central control host
CN106067121A (en) * 2016-06-15 2016-11-02 华中科技大学 A kind of product off-line false distinguishing method based on NFC technique
CN106067121B (en) * 2016-06-15 2019-05-14 华中科技大学 A kind of offline false distinguishing method of product based on NFC technique
CN108900297A (en) * 2018-07-06 2018-11-27 北京智芯微电子科技有限公司 Using ciphertext as the method and product of the electronic identity code of underground electron marker
CN110689102A (en) * 2019-09-30 2020-01-14 上海华苑电子有限公司 Electronic tag management system
CN114239629A (en) * 2022-02-22 2022-03-25 深圳市成为信息技术有限公司 Anti-counterfeiting verification method of label, UHF handheld terminal and storage medium

Also Published As

Publication number Publication date
CN103413079B (en) 2016-08-10

Similar Documents

Publication Publication Date Title
CN103413079A (en) Method for generating ID (identity card) code on basis of encryption calculation of TID (terminal identification) code and EPC (electronic product code)
KR101813658B1 (en) RFID based genuine product certification service system and method using cipher update algorithm for forgery prevention
ATE261152T1 (en) SYSTEM FOR AUTOMATIC CONTACTLESS DATA COLLECTION
CN103609136A (en) Method for in-situ upgrading RFID readers
CN102682311B (en) Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation
US9607286B1 (en) RFID tags with brand protection and loss prevention
CN107231231A (en) A kind of method and system of terminal device secure accessing Internet of Things
KR102293888B1 (en) RFID based genuine product certification service system using cipher update algorithm of certification key for forgery prevention to use distributed ledger stored in RFID key storage
Kulkarni et al. RFID security issues & challenges
El Beqqal et al. Review on security issues in RFID systems
CN102456146A (en) Method for guaranteeing uniqueness of digital certificate based on RFID (radio frequency identification device) technology
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
CN102411748B (en) Safety anti-counterfeiting method based on two wireless radio frequency tags
CN103840941B (en) Based on the location privacy method in the thing network sensing layer certification of Chinese remainder theorem
Mohite et al. RFID security issues
CN103942479A (en) Electronic fingerprint identity label generating and verifying method
Toyoda et al. Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains
CN106778939A (en) Electronic tag sensor-based system
CN102160062B (en) Safe initialization procedure for communication system
CN103793742A (en) Technology of electronic tag safety authentication and information encryption of traffic electronic license plate
KR20040092669A (en) A rfid terminal and a tag with security function
CN103763106A (en) Position privacy protection method in Internet-of-Things authentication
CN110232296B (en) System for encrypted communication between RFID (radio frequency identification) tag and reader-writer
CN102324005A (en) Security authentication method, system and device for terminal without computing capability
KR101053636B1 (en) Encryption/decryption method and system for rfid tag and reader using multi algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Suzhou City, Jiangsu province 215000 Suzhou District Chang Xu Road No. 483 Industrial Investment Technology Park Building 7, room 7108

Patentee after: Suzhou zhongtianli Information Technology Co.,Ltd.

Address before: Suzhou City, Jiangsu province 215000 Suzhou District Chang Xu Road No. 483 Industrial Investment Technology Park Building 7, room 7108

Patentee before: MASSKY Inc.

CP01 Change in the name or title of a patent holder