CN103413079A - Method for generating ID (identity card) code on basis of encryption calculation of TID (terminal identification) code and EPC (electronic product code) - Google Patents
Method for generating ID (identity card) code on basis of encryption calculation of TID (terminal identification) code and EPC (electronic product code) Download PDFInfo
- Publication number
- CN103413079A CN103413079A CN2013103205653A CN201310320565A CN103413079A CN 103413079 A CN103413079 A CN 103413079A CN 2013103205653 A CN2013103205653 A CN 2013103205653A CN 201310320565 A CN201310320565 A CN 201310320565A CN 103413079 A CN103413079 A CN 103413079A
- Authority
- CN
- China
- Prior art keywords
- code
- epc
- tid
- encryption calculation
- unique
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method for generating an ID code on the basis of encryption calculation of a TID code and an EPC. The encryption calculation is finished in an RFID (radio frequency identification device) reader-writer, and the obtained ID code can be applied to multiple fields, for example, all systems of a security and protection system, a stored-value system and the like, which require ID confirmation. According to the method for generating the ID code on the basis of encryption calculation of the TID code and the EPC, a unique TID code in an RFID tag is taken as a secret key, one ID code is generated through encryption calculation of the EPC code, and the ID code is unique and obtained through encryption calculation. The method has the advantages that even if the EPC code and TID code of the RFID tag are intercepted by a third party or the EPC code is replicated, one ID code which is identical to the ID code obtained through encryption calculation is impossible to generate, the uniqueness of ID code comes into existence unless the TID code loses uniqueness, and the safety of a system requiring identity recognition is improved.
Description
Technical field
The present invention relates to a kind of method of the ID of generation code, be specifically related to a kind of method based on TID code in the RFID electronic tag and EPC code encryption calculating generation ID code.
Background technology
Product electronic code (EPC coding) is the new generation product coding scheme that international bar code tissue is released.Product bar code originally is only the coding to product classification, and the EPC code is given a unique coding in the whole world to each single product.The coding scheme of 96 (scale-of-two) modes of EPC coding, can be endowed for 2.68 hundred million companies, can there be 1,600 ten thousand product classifications in each company, and every series products has 68,000,000,000 stand-alone product coding, figuratively can compose a unique coding for tellurian each rice.The EPC code does not need password can directly utilize the read write line read-write.If only select EPC, although the EPC code has 96bit, perhaps higher 128bit capacity, but because the EPC code is disclosed, the read write line of any EPC of meeting C1GEN2 all can be read it, or revise its content, and even copying an identical label of EPC code, this has also caused the limitation on safety to application.
The TID code is the global unique ID number be comprised of some bytes that chip manufacturer is solidificated in the ROM the inside while dispatching from the factory.The TID code does not need password directly with read write line, to read.If select the TID code, although the TID code has uniqueness, can be used for representative and the identification of identity, because TID code book body 8 byte information can't its revised context, so caused equally the limitation of application.
With the RFID electronic tag in USER district, although need password authentification when read-write, not every label all is with the USER district on the one hand; When read write line and label carried out air communication, the password of checking use was was easily intercepted and captured and is cracked by the third party on the other hand, and this has equally also reduced the safety in utilization of label as identification ID.Simultaneously, when many labels were read to the USER district, operating speed was slower, and the encryption be not suitable under intensive label condition is read.
The ultrahigh frequency RFID electronic tag, be to use the EPC code as plain code, and the TID code is as manufacturer, and the USER district is as the privately owned district that reads and writes data of user (just can complete read-write with password authentification) and the electronic tag of making.With the ultrahigh frequency RFID electronic tag, replace traditional IC-card to carry out empowerment management in security system etc. needs the field of identification, have distance sensing to read, facilitate user's characteristics.The mode of application is mainly at present: using the EPC code as unique identification, or using the USER district as unique identification, or using the TID code as unique identification, carry out ID code sign, but all have the possibility that is replicated or is intercepted and captured, thereby security of system was lost efficacy.In view of above analysis, need to carry out to the ID code occasion of identity validation, the application of RFID technology need to have special means to realize.
Summary of the invention
For solving the problems of the technologies described above, the object of the present invention is to provide a kind of ID code safety that can guarantee that rfid system provides unique, and calculate based on TID code and EPC code encryption the method that produces the ID code.
For achieving the above object, the invention provides following technical scheme: a kind of method based on TID code and EPC code encryption calculating generation ID code, this computations completes in rfid interrogator inside, it is characterized in that, the method that described computations produces the ID code comprises the following steps:
(a) rfid interrogator is to RFID electronic tag inquiry TID code and EPC code;
(b) the RFID electronic tag is replied TID code and EPC code to rfid interrogator;
(c) rfid interrogator is usingd unique code TID code as key, by computations, obtains an ID code with the EPC code;
Further, described ID code is unique.
Further, unique described ID code is sent to other application systems or equipment is used as the ID identity code.
Further, described ID code can be applicable to a plurality of security fields that need identity validation.
Adopt the beneficial effect of above technical scheme to be: utilize unique TID code as key, by the EPC code encryption is generated to ID, this ID is unique, obtains through computations.Even EPC code and TID code that such benefit is exactly this RFID electronic tag are intercepted and captured by the third party, or the EPC code is replicated, also can not produce one with the identical ID code of the ID code obtained after computations, make the uniqueness of ID code set up (unless the TID code loses uniqueness), guaranteed to need uniqueness, the security of ID code in the system of identification.
The accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the principle of work block scheme of a kind of RFID gate control system disclosed by the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making under the creative work prerequisite the every other embodiment obtained, belong to the scope of protection of the invention.
Referring to Fig. 1, as shown in legend wherein, a kind of RFID gate control system, comprise RFID electronic tag, rfid interrogator, access controller and gate inhibition topworks.Above-mentioned RFID electronic tag comprises that an antenna for signal transmission, is be used to storing EPC Ma De EPC district, be used to storing TID Ma De TID district and a USER district; Above-mentioned rfid interrogator comprises an antenna for signal transmission and a MCU; The corresponding calculation procedure of above-mentioned MCU burning;
Below introduce the job step of above-mentioned gate control system:
(a) when the close rfid interrogator antenna of RFID electronic tag, rfid interrogator is by day alignment RFID electronic tag inquiry TID code and an EPC code;
(b) the RFID electronic tag is replied TID code and EPC code to rfid interrogator;
(c) rfid interrogator be take the TID code and is key, by the EPC code encryption is generated to the ID code;
(e) the ID code generated is joined and is sent to access controller by line by rfid interrogator;
(f) access controller is identified this ID code, if confirm as effective mandate, and the access control topworks action of opening the door; If confirm as Lame delegation, the access control topworks action of not opening the door.
TID code, EPC code in above-mentioned RFID electronic tag are intercepted and captured by third party device, or the EPC code is copied by third party device, because this ID code obtains through computations by original EPC code and TID code, therefore in the situation that the third party does not know encryption computing method, therefore the third party can't obtain the corresponding ID code of this RFID electronic tag, to the intercepting and capturing of RFID electronic tag or to copy be invalid.
Adopt the beneficial effect of above technical scheme to be: utilize unique TID code as key, by the EPC code encryption is generated to the ID code, this ID code is unique.Even EPC code and TID code that such benefit is exactly this RFID electronic tag are intercepted and captured by the third party, or the EPC code is replicated, also can not produce one with the identical ID code of the ID code obtained after computations, make the uniqueness of ID code set up (unless the TID code loses uniqueness), guaranteed to need the security of the system of identification.
Be more than the description to the embodiment of the present invention, by the above-mentioned explanation to the disclosed embodiments, make professional and technical personnel in the field can realize or use the present invention.Multiple modification to these embodiment will be apparent for those skilled in the art, and General Principle as defined herein can be in the situation that do not break away from the spirit or scope of the present invention, realization in other embodiments.Therefore, the present invention will can not be restricted to these embodiment shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.
Claims (4)
1. one kind is calculated based on TID code and EPC code encryption the method that produces the ID code, and this computations completes in rfid interrogator inside, it is characterized in that, the method that described computations produces the ID code comprises the following steps:
(a) rfid interrogator is to RFID electronic tag inquiry TID code and EPC code;
(b) the RFID electronic tag is replied TID code and EPC code to rfid interrogator;
(c) rfid interrogator is usingd unique code TID code as key, by cryptographic calculation, obtains an ID code with the EPC code.
2. the method based on TID code and EPC code encryption calculating generation ID code according to claim 1, is characterized in that, described ID code is unique.
3. the method based on TID code and EPC code encryption calculating generation ID code according to claim 1, is characterized in that, unique described ID code is sent to other application systems or equipment is used as the ID identity code.
4. the method based on TID code and EPC code encryption calculating generation ID code according to claim 1, is characterized in that, described ID code can be applicable to a plurality of security fields that need identity validation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310320565.3A CN103413079B (en) | 2013-07-29 | 2013-07-29 | A kind of method calculating generation ID code based on TID code and EPC code encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310320565.3A CN103413079B (en) | 2013-07-29 | 2013-07-29 | A kind of method calculating generation ID code based on TID code and EPC code encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103413079A true CN103413079A (en) | 2013-11-27 |
CN103413079B CN103413079B (en) | 2016-08-10 |
Family
ID=49606090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310320565.3A Active CN103413079B (en) | 2013-07-29 | 2013-07-29 | A kind of method calculating generation ID code based on TID code and EPC code encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103413079B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104198026A (en) * | 2014-08-28 | 2014-12-10 | 福州科迪电子技术有限公司 | Electronic scale capable of being monitored |
CN104217230A (en) * | 2014-08-29 | 2014-12-17 | 公安部交通管理科学研究所 | Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID) |
CN104660414A (en) * | 2015-02-03 | 2015-05-27 | 北京安如山文化科技有限公司 | Ciphertext storage method and technique in RFID |
CN104932389A (en) * | 2015-05-21 | 2015-09-23 | 广州市纬志电子科技有限公司 | Anti-fake method and anti-fake device for central control host |
CN106067121A (en) * | 2016-06-15 | 2016-11-02 | 华中科技大学 | A kind of product off-line false distinguishing method based on NFC technique |
CN108900297A (en) * | 2018-07-06 | 2018-11-27 | 北京智芯微电子科技有限公司 | Using ciphertext as the method and product of the electronic identity code of underground electron marker |
CN110689102A (en) * | 2019-09-30 | 2020-01-14 | 上海华苑电子有限公司 | Electronic tag management system |
CN114239629A (en) * | 2022-02-22 | 2022-03-25 | 深圳市成为信息技术有限公司 | Anti-counterfeiting verification method of label, UHF handheld terminal and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102339399A (en) * | 2010-07-22 | 2012-02-01 | 上海孚恩电子科技有限公司 | Anti-counterfeiting method based on RFID electronic label |
CN103150655A (en) * | 2013-03-25 | 2013-06-12 | 曹鹏 | Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system |
CN103218591A (en) * | 2013-05-07 | 2013-07-24 | 南京大学 | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same |
-
2013
- 2013-07-29 CN CN201310320565.3A patent/CN103413079B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102339399A (en) * | 2010-07-22 | 2012-02-01 | 上海孚恩电子科技有限公司 | Anti-counterfeiting method based on RFID electronic label |
CN103150655A (en) * | 2013-03-25 | 2013-06-12 | 曹鹏 | Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system |
CN103218591A (en) * | 2013-05-07 | 2013-07-24 | 南京大学 | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104198026A (en) * | 2014-08-28 | 2014-12-10 | 福州科迪电子技术有限公司 | Electronic scale capable of being monitored |
CN104217230A (en) * | 2014-08-29 | 2014-12-17 | 公安部交通管理科学研究所 | Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID) |
CN104217230B (en) * | 2014-08-29 | 2017-03-15 | 公安部交通管理科学研究所 | The safety certifying method of hiding ultrahigh frequency electronic tag identifier |
CN104660414A (en) * | 2015-02-03 | 2015-05-27 | 北京安如山文化科技有限公司 | Ciphertext storage method and technique in RFID |
CN104932389A (en) * | 2015-05-21 | 2015-09-23 | 广州市纬志电子科技有限公司 | Anti-fake method and anti-fake device for central control host |
CN106067121A (en) * | 2016-06-15 | 2016-11-02 | 华中科技大学 | A kind of product off-line false distinguishing method based on NFC technique |
CN106067121B (en) * | 2016-06-15 | 2019-05-14 | 华中科技大学 | A kind of offline false distinguishing method of product based on NFC technique |
CN108900297A (en) * | 2018-07-06 | 2018-11-27 | 北京智芯微电子科技有限公司 | Using ciphertext as the method and product of the electronic identity code of underground electron marker |
CN110689102A (en) * | 2019-09-30 | 2020-01-14 | 上海华苑电子有限公司 | Electronic tag management system |
CN114239629A (en) * | 2022-02-22 | 2022-03-25 | 深圳市成为信息技术有限公司 | Anti-counterfeiting verification method of label, UHF handheld terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN103413079B (en) | 2016-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103413079A (en) | Method for generating ID (identity card) code on basis of encryption calculation of TID (terminal identification) code and EPC (electronic product code) | |
KR101813658B1 (en) | RFID based genuine product certification service system and method using cipher update algorithm for forgery prevention | |
ATE261152T1 (en) | SYSTEM FOR AUTOMATIC CONTACTLESS DATA COLLECTION | |
CN103609136A (en) | Method for in-situ upgrading RFID readers | |
CN102682311B (en) | Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation | |
US9607286B1 (en) | RFID tags with brand protection and loss prevention | |
CN107231231A (en) | A kind of method and system of terminal device secure accessing Internet of Things | |
KR102293888B1 (en) | RFID based genuine product certification service system using cipher update algorithm of certification key for forgery prevention to use distributed ledger stored in RFID key storage | |
Kulkarni et al. | RFID security issues & challenges | |
El Beqqal et al. | Review on security issues in RFID systems | |
CN102456146A (en) | Method for guaranteeing uniqueness of digital certificate based on RFID (radio frequency identification device) technology | |
CN102594550A (en) | RFID internal mutual authentication safety protocol based on secret key array | |
CN102411748B (en) | Safety anti-counterfeiting method based on two wireless radio frequency tags | |
CN103840941B (en) | Based on the location privacy method in the thing network sensing layer certification of Chinese remainder theorem | |
Mohite et al. | RFID security issues | |
CN103942479A (en) | Electronic fingerprint identity label generating and verifying method | |
Toyoda et al. | Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains | |
CN106778939A (en) | Electronic tag sensor-based system | |
CN102160062B (en) | Safe initialization procedure for communication system | |
CN103793742A (en) | Technology of electronic tag safety authentication and information encryption of traffic electronic license plate | |
KR20040092669A (en) | A rfid terminal and a tag with security function | |
CN103763106A (en) | Position privacy protection method in Internet-of-Things authentication | |
CN110232296B (en) | System for encrypted communication between RFID (radio frequency identification) tag and reader-writer | |
CN102324005A (en) | Security authentication method, system and device for terminal without computing capability | |
KR101053636B1 (en) | Encryption/decryption method and system for rfid tag and reader using multi algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Suzhou City, Jiangsu province 215000 Suzhou District Chang Xu Road No. 483 Industrial Investment Technology Park Building 7, room 7108 Patentee after: Suzhou zhongtianli Information Technology Co.,Ltd. Address before: Suzhou City, Jiangsu province 215000 Suzhou District Chang Xu Road No. 483 Industrial Investment Technology Park Building 7, room 7108 Patentee before: MASSKY Inc. |
|
CP01 | Change in the name or title of a patent holder |